Help Net Security
Nmap 6 released
Nmap is a free and open source utility for network exploration or security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the …
Instant decryption of MS Office 2010 documents now possible
Passware announced Passware Kit Forensic 11.7, which includes live memory analysis and subsequent decryption of MS Word or Excel 2007-2010 files. In addition, the new version …
Policy-based automation of storage provisioning
iWave Software announced iWave Storage Automator version 6, a storage automation software product that lets enterprise IT organizations and service providers deliver Storage …
Organizations struggling to enforce policies for managing records
Despite greater investments in their information management programs, most organizations still struggle with properly implementing those programs and getting employees to …
Cloud Security Alliance announces EMEA congress
Building on the success of the Cloud Security Alliance Congresses held in the USA, the inaugural CSA EMEA Congress (Amsterdam, 25-26 September 2012) will provide practical …
IEEE introduces standard for body area networking
IEEE, the world’s largest professional association advancing technology for humanity, today announced a new standard, IEEE 802.15.6TM-2012, optimized to serve wireless …
Week in review: Vulnerable CCTV systems, Pinterest scam toolkits, and top three security concerns for CSOs and CIOs
Here’s an overview of some of last week’s most interesting news, podcasts, videos and articles: IT candidates should shift career perspectives Enterprises seem to …
MacScan 2.9.3 with Google Chrome and SeaMonkey support released
SecureMac released MacScan 2.9.3, which features tracking cookie detection and cleaning for Google’s Chrome browser. MacScan is the premier Macintosh security program, …
Spam with malicious attachments rising
While the volume of spam messages is falling, the number of messages containing malicious attachments increased, meaning that spam is growing more dangerous even as it becomes …
Password creation policies are the enemy of secure passphrases
Commenting on reports that a security developer has concluded that password-creation policies are the enemy of secure passwords, SecurEnvoy co-founder Steve Watts says that …
Secure data on Android devices with SecureZIP
PKWARE announced SecureZIP Reader for Android, an application that secures enterprise and government data. The SecureZIP Solution secures corporate information that end-users …
Common Vulnerability Reporting Framework updated
The Industry Consortium for Advancement of Security on the Internet (ICASI) announced Common Vulnerability Reporting Framework (CVRF), Version 1.1. Enhancements offer users a …
Featured news
Resources
Don't miss
- Why your security team feels stuck
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)