Help Net Security
Wireshark 1.4.7 released
Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. The following vulnerabilities have been fixed: …
Social networking safety tips for kids
“Many parents are rightfully concerned about their kid’s participation in social networks. There are a number of areas to be concerned with. Who are the kids …
Apple includes malware removal in security update
Apple just released Security Update 2011-003 which can be downloaded and installed via Software Update preferences, or from Apple Downloads. This is a small update weighing …
Romanian president declared dead by e-mail scam
BitDefender discovered a spam wave using the Romanian president’s image to help spread malware. The unsolicited e-mail relies on a classic combination of social …
Spam rate increases, growth expected to continue
Compared to the previous month, the amount of spam in email traffic increased by 1.2 per cent and averaged 80.8 per cent, according to Kaspersky Lab’s most recent …
Encrypt files on Mac with BestCrypt
Jetico announced that their popular BestCrypt Container Encryption software now offers full compatibility with Mac computers. The software delivers data protection. Selected …
Data center IT departments fear targeted attacks
IT departments are now turning to virtualization, with half of the respondents having either implemented or are planning to deploy private clouds, according to a McAfee study. …
Broadcom releases 40nm Wi-Fi and Bluetooth combo chip
Broadcom released the BCM43142 InConcert combo chip which combines Wi-Fi Direct connectivity with seamless proximity-based pairing, simplifying wireless connectivity in the …
Web Application Attack and Audit Framework 1.0 released
The Web Application Attack and Audit Framework’s (w3af) goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend. …
25 years of mobile security
This year marks the 25th anniversary of my first foray into mobile security. True story. Back in the day, the early halcyon days of mobile computing, any device weighing in at …
Week in review: LinkedIn, Hotmail security flaws, Chrome apps with dangerous permissions and the evolution of Mac fake AV
Here’s an overview of some of last week’s most interesting news: 1.5 billion smart credentials to ship The increasing use of smart cards and biometric capture has …
Code in the Cloud: Programming Google AppEngine
Cloud applications are the next big shift in application development: instead of building single-user applications to run on a personal computer, new applications are being …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations