Help Net Security
The Linux Command Line
Thanks to user-friendly distributions like Ubuntu, more people are running Linux than ever before. But many users stick to the GUI and point and click their way through tasks, …
Microsoft releases seven bulletins
2012’s first Patch Tuesday has seven bulletins, including the postponed bulletin from December 2011 that addresses the BEAST style information disclosure. Talking about …
Is your online bank vulnerable to currency rounding attacks?
In the 12+ years of doing penetration tests against various critical environments, we’ve seen numerous online banking servers and found all sorts of vulnerabilities in …
Spam emails link to QR codes
It was just a matter of time, and now it’s happening. The Websense ThreatSeeker Network has started spotting spam messages that lead to URLs that use embedded QR codes. …
Recycled cybercrime tactics adapted to conceal fraud
GFI Software released its VIPRE Report for December 2011, a collection of the most prevalent threat detections encountered during the month. Phishing campaigns once again …
Oracle Database Firewall extends support to MySQL
In an effort to assist organizations further prevent internal and external attacks from reaching their enterprise databases, Oracle released its Database Firewall which …
Netgear unites home networking and storage
A CES Innovations Design and Engineering Award Honoree, the NETGEAR Media Storage Router (WNDR4700) embodies the intersection of two of the most important consumer technology …
Biometric technologies for Android
Neurotechnology announced their new line of embedded biometric technologies, including VeriFinger Embedded SDK for fingerprint biometrics, VeriLook Embedded SDK for face …
Forensic email data analysis tool
DIGITS, a firm specializing in computer forensics and digital investigations, released Evidence Analyzer: Email Edition, which is designed to radically streamline the process …
5 reasons to enforce email monitoring
Managing storage continues to be one of the most significant challenges for email management, but the right tools can change this from a daily headache to an easy win. Email …
Mobile Security 6.0 for Android released
NQ Mobile released Mobile Security 6.0 for Android as a free download. This update offers Android users several new features to protect their privacy and financial …
Most unusual laptop recovery stories
Absolute Software Corporation takes a look back at some of its most unforgettable computer theft recovery cases. They’ve seen it all – helping local police to …
Featured news
Resources
Don't miss
- PAN-OS authentication bypass hole plugged, PoC is public (CVE-2025-0108)
- The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance
- Over 3 million Fortune 500 employee accounts compromised since 2022
- CISOs and boards see things differently
- It’s time to secure the extended digital supply chain