Help Net Security
Free virtual machine management tool
vOPS Server Explorer is a suite of five free utilities for VM administrators. The included tools are: Storage Explorer – Storage performance and capacity views across …
Cyber-espionage campaign targeting diplomatic and government institutions
Kaspersky Lab identified an elusive cyber-espionage campaign targeting diplomatic, governmental and scientific research organizations in several countries for at least five …
Vulnerability of oil and gas infrastructure drives security investments
Security of critical facilities remains the topmost priority for the global oil and gas industry. Escalating demand for oil and gas, the construction of new facilities, and …
Compliance auditing: The first step to cyber security
Assuring that your company complies with industry standards is imperative. Being compliant not only heightens your reputation and allows you to trade in some industries, it …
High volume biometric fingerprint and iris identification
Neurotechnology released MegaMatcher Accelerator 5.0, a multi-biometric software and hardware solution designed for large-scale projects that require high-volume, high-speed …
Automating security for developers with Minion
Minion is a security testing framework built by Mozilla to brdige the gap between developers and security testers. To do so, it enables developers to scan their projects using …
Browser Exploitation Framework LiveCD
The Browser Exploitation Framework (BeEF) is a penetration testing tool that focuses on the web browser. BeEF allows penetration testers to assess the actual security posture …
Tokenless authentication comes to the cloud
SecurEnvoy has partnered with PasswordBank to bring the leading tokenless two-factor authentication capabilities to the PasswordBank identity management offering. Customers …
Increase in targeted spam and phishing attacks via e-mail
The threat level in the field of e-mail security increased in 2012 and will continue to do so in 2013 – despite the fact that spam levels decreased by 53% in 2012 as …
Automotive black box protects cyber data
The U.S. government rulemaking proposal seeks to mandate an automotive black box / Event Data Recorder (EDR) that you cannot turn-off, disable, or remove. You vehicle may …
Mac Kung Fu, 2nd Edition: Tips, Tricks, Hints, and Hacks
Get over 400 quick and easy tips, tricks, hints and hacks in Mac Kung Fu, Second Edition. Exploit secret settings and hidden apps, push built-in tools to the limit, radically …
Week in review: Java 0-day wreaking havoc, hiding messages in Skype silences, Apple prevents popular app scam tactic
Here’s an overview of some of last week’s most interesting news and articles: Hiding secret messages in Skype silences A group of researchers from the Institute of …
Featured news
Resources
Don't miss
- Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
- Microsoft revokes 200 certs used to sign malicious Teams installers
- A new approach to blockchain spam: Local reputation over global rules
- SAP zero-day wake-up call: Why ERP systems need a unified defense
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)