Help Net Security
Metasploit Pro increases vulnerability management efficiency
Rapid7 introduced the means to increase vulnerability management efficiency by leveraging intelligence from its penetration testing solution, Metasploit Pro, to validate …
Real-time fraud prevention with PhoneID Contact
TeleSign announced the newest product in the PhoneID suite, which helps online businesses block fraud by delivering name and address details based on a phone number. PhoneID …
Energy grids are prime attack targets
The electrical power grid is the backbone on which everything else depends. A cybercriminal could debilitate a major city by a single targeted attack on the energy grid and …
Cyber espionage campaign in the Middle East
Kaspersky Lab researchers announced the results of a joint-investigation with Seculert regarding Madi, an active cyber-espionage campaign targeting victims in the Middle East. …
Most companies block cloud services
While 80 percent of companies do not allow their employees to use cloud based file synchronization services, 70 percent of companies would use these services if they were as …
Oracle releases 87 security fixes
The Oracle Critical Patch Update (CPU) Advisory for July 2012 contains 87 security fixes for various products across their portfolio. This advisory is a bit of déjà vu …
Rapid password cracking using Pico FPGA-based hardware
ElcomSoft updated two password recovery tools, employing Pico FPGA-based hardware to greatly accelerate the recovery of passwords. Users of Elcomsoft Phone Password Breaker …
MPs call for cyber war on Britain’s cyber enemies
Britain’s security and intelligence agencies have been urged by MPs to engage in cyber attacks against enemy states in a report released by The Intelligence and Security …
Real-time IP address blocking of DDoS attacks
Corero Network Security is extending its capabilities with the launch of ReputationWatch. It will identify in real-time known malicious entities and block access to …
IPv6 and click fraud
The good news: To accommodate the ever-increasing demand for IP Addresses around the world, every network will eventually transition to IPv6 from IPv4. The bad news: Spammers …
Panda Cloud Antivirus 2.0 released
Panda Security launched Panda Cloud Antivirus 2.0 for both its Free and Pro editions. The new version is fully compatible with Windows 8 Release Preview and incorporates a new …
Send messages with file attachments in a secure environment
TigerText introduced the ability to send file attachments today through an API integration with Dropbox. TigerText users will now be able to securely and instantly send PDF, …
Featured news
Resources
Don't miss
- Life, death, and online identity: What happens to your online accounts after death?
- OpenFGA: The open-source engine redefining access control
- For blind people, staying safe online means working around the tools designed to help
- 3 DevOps security pitfalls and how to stay ahead of them
- CISA warns of Windows SMB flaw under active exploitation (CVE-2025-33073)