Help Net Security
Tool for analysis of DOM based XSS issues
DOMinator is a Firefox based software for analysis and identification of DOM based Cross Site Scripting issues (DOMXss). It is the first runtime tool which can help security …
Best practices to reduce risk in cloud contracts
IT procurement or sourcing managers challenged with finding sourcing options that reduce costs at tolerable risks should examine nine contractual terms to reduce risk in cloud …
nCircle debuts PureCloud security scanning technology
nCircle announced in collaboration with HITRUST the debut of PureCloud, a security scanning technology, and the integration of PureCloud into the HITRUST CSF Assessment for …
Red Hat Enterprise Linux 6.1 released
Red Hat Enterprise Linux 6.1 is now available. Enhancements provide improvements in system reliability, scalability and performance, coupled with support for upcoming system …
OpenSSL weakness can expose sensitive information
A weakness has been reported in OpenSSL, which can be exploited by malicious people to disclose potentially sensitive information, according to Secunia. The weakness is caused …
VM Explorer 3.5 released
VM Explorer is a management tool that eases management, backup and disaster recovery tasks in your VMware ESX environment. Backups can be stored on ESX, Windows, Linux and …
ElcomSoft exposes information in BlackBerry backups
With BlackBerries occupying approximately 40 per cent of the North American market of business communicators and about 20 per cent of the market worldwide, accessing …
Insider threats plague data managers
Financial services organizations struggle with human error, abuse of privileges more than most. Application Security, Unisphere Research, and the International Sybase Users …
Microsoft Web Application Configuration Analyzer 2.0 released
Web Application Configuration Analyzer (WACA) is a tool that scans a server against a set of best practices recommended for pre-production and production servers. The list of …
A guideline for critical information infrastructure governance
ENISA launched a new publication on National Risk Management (NRM) preparedness. The report sets out the essential elements as a guideline for the governance of NRM in …
SpyEye Trojan attacks Verizon’s online payment page
Trusteer discovered a configuration of the SpyEye Trojan targeting Verizon’s online payment page and attempting to steal payment card information. The attack took place …
Worrying trend in credit card data security
A new BitDefender study which has revealed some concerning statistics on the personal protection of credit card data. 97% of 2,210 respondents aged 18 to 65 said they …
Featured news
Sponsored
Don't miss
- Hide yo environment files! Or risk getting your cloud-stored data stolen and held for ransom
- Critical RCE bug in SolarWinds Web Help Desk fixed (CVE-2024-28986)
- How passkeys eliminate password management headaches
- Delta vs. CrowdStrike: The duties vendors owe to customers – or do they?
- IntelOwl: Open-source threat intelligence management