Help Net Security
Digital ship pirates: Researchers crack vessel tracking system
In the maritime business, Automated Identification Systems (AIS) are a big deal. They supplement information received by the marine radar system, are used for a wide variety …
Python for web application security professionals
Python is an open source, interactive, object oriented programming language. It’s very easy to learn and an extremely powerful high level language. It runs on Windows, …
Oracle fixes 127 vulnerabilities in its products
The story here is that Oracle has synced up their Java patching with the rest of their patching cycle and, when it comes to vulnerabilities, Java always steals the show. The …
Video: Hacking back and active defense
In this DerbyCon video, John Strand will demonstrate the Active Defense Harbinger Distribution, a DARPA funded, free Active Defense virtual machine. He will debunk many of the …
Top vertical industry predictions for IT organizations for 2014
Gartner has revealed its top industry predictions for IT organizations and users for 2014 and beyond. Most industries are facing accelerating pressure for fundamental …
Social identity theft protection
Riskive unveiled FriendGuard, a free app that leverages advanced math and science to protect individuals and families against social identity theft and malware attacking their …
Barracuda unveils new firewall models
Barracuda Networks announced five new models of the Barracuda NG Firewall F600, which feature multiple port options and hot-swappable power supplies to accommodate varying …
Fraudware virus targeting Android users in China and South East Asia
NQ Mobile has identified, “Copycat App,” a new fraudware virus threat targeting Android users in China and several countries in South East Asia. “Copycat …
WordPress security threats, protection tips and tricks
Robert Abela is a WordPress Security Professional and founder of WP White Security. In this interview he talks about the main WordPress security risks, offers tips for website …
Video: Antivirus evasion techniques
This video from DerbyCon discusses the basics of the AV evasion problem, what techniques work, which ones don’t and why. The talk has a particular focus on AV evasion as …
CipherCloud delivers searchable strong encryption
CipherCloud has delivered techniques to improve the searchability, usability and security of cloud data protected with AES 256-bit encryption. The solution also enables …
Real-time operational risk and compliance monitoring
Corvil announced a real-time general purpose risk and compliance monitoring solution for all kinds of electronic trading businesses. The solution monitors and captures all …