Help Net Security
Week in review: SSL encryption cracked, new Mac Trojan and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: Smartphone and tablet security tips ICSA Labs is offering a series of tips that …
Over 300 cyberspy attacks against Russian targets discovered
Trend Micro researchers have discovered that 1465 computers belonging to 47 distinct political and economical entities in 61 different (mostly former Soviet Union) countries …
Strong security is just common sense
For many years those who concerned themselves with an organization’s cyber security warned of threats, both internal and external, urging organizations to adequately …
How to build a trusted virtualized platform
Trusted Computing Group (TCG) released the first Virtualized Platform Architecture, which describes how to build a trusted virtualized platform. With this specification, …
ICSA Labs launches network IPS testing program
ICSA Labs is launching a quarterly testing program for network intrusion prevention systems. The quarterly testing, which is available to all IPS manufacturers, is also an …
Veracode enhances its application risk management platform
Veracode, announced enhancements to its cloud-based application risk management platform that make it even easier to embed security verification processes into the software …
OpenStack Diablo to power global clouds
OpenStack, the open source cloud operating system, released Diablo, the fourth version of its community-driven software. OpenStack Diablo allows users to automate and control …
Tips for safe online shopping
Avira recommends that consumers watch for a few things in order to not become a victim of the online fraudsters: 1. Always check that the connection to the online store where …
FortiNet FortiAnalyzer XSS and script insertion vulnerabilities
Two vulnerabilities have been reported in FortiNet FortiAnalyzer, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to …
Security guidelines for PKI-based transactions
For all the infrastructure advantages and business benefits of PKI, recent breaches clearly indicate that the way in which PKI is implemented may not be as inherently secure …
Cisco reveals the importance of networks in daily life
Demonstrating the increasing role of the network in people’s lives, an international workforce study by Cisco revealed that one in three college students and young …
(IN)SECURE Magazine issue 31 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 31 has been released today. Table of contents: The …
Featured news
Resources
Don't miss
- Security work keeps expanding, even with AI in the mix
- Ivanti provides temporary patches for actively exploited EPMM zero-day (CVE-2026-1281)
- Google disrupts proxy network used by 550+ threat groups
- eScan AV users targeted with malicious updates
- Google agrees to pay $135 million over Android data harvesting claims