Help Net Security
Multiple vulnerabilities in Symantec Endpoint Protection Manager
Multiple vulnerabilities have been discovered in Symantec Endpoint Protection Manager, which can be exploited by malicious people to conduct cross-site scripting and request …
OpenDNSSEC 1.2.2 released
Internet engineers continue to enhance Internet security with the release of OpenDNSSEC, a tool which simplifies the process of signing one or more zones with DNSSEC. …
Identity thief admits stealing $770,000
A Brooklyn, N.Y., man pleaded guilty for his role in managing a credit card fraud operation that operated throughout the East Coast of the United States. Jonathan Oliveras, …
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the …
Adobe patches multiple products
Today, Adobe released the following Security Bulletins: APSB11-19 – Security update available for Adobe Shockwave Player (Critical) APSB11-20 – Security update …
P25 security mitigation guide
In a recent research paper [pdf], we analyzed the security features of the APCO Project 25 (P25) digital two-way radio system. P25 radios are widely deployed in the United …
Bitdefender Mobile Security for Android now with live tracking anti-theft feature
Bitdefender added two major new features to its free Mobile Security for Android Beta. The new anti-theft function allows users to easily track where their device is and to …
Panasonic Toughbook S10 comes with security features
Panasonic announced the Toughbook S10. Powered by an Intel Core i5-2520M vPro processor, it delivers up to 12.5 hours of standard battery life and weighs only 3.0 pounds. The …
A look into Black Hat’s wireless network
Aruba Networks, which provided and maintained the wireless network for last week’s Black Hat USA 2011 conference, today provided some interesting statistics around the …
Half of organizations lost information on USB drives
Inexpensive consumer USB Flash drives are ubiquitous in all manner of enterprise and government environments – typically with very little oversight or controls, even in …
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare explores the battlefields, participants and the tools and techniques used during today’s digital conflicts. The concepts discussed in this book will give …
Microsoft releases 13 security bulletins, fixes 22 vulnerabilities
Today Microsoft released 13 security bulletins, two rated Critical, nine Important and two Moderate. These bulletins address 22 unique vulnerabilities in Internet Explorer, …