Help Net Security
Prototype for first virtualized ATM
For nearly 20 years, onboard computing technology has been at the core of the ATM. But, Diebold is leveraging virtualization technology to introduce a prototype for the …
Slow HTTP DoS vulnerability test tool
Slow HTTP DoS attacks rely on the fact that the HTTP protocol, by design, requires requests to be completely received by the server before they are processed. If an HTTP …
VMware acquires PacketMotion
PacketMotion has been acquired by VMware. Terms of the acquisition were not disclosed. PacketMotion’s PacketSentry UAM solution has been extensively deployed in support …
Disaster preparedness tips for computers
ISACA offers tips to the public and businesses to protect their computers, information and systems during a natural disaster. “Ensuring personal and employee safety is …
PBConnex: Full-disk encryption with pre-boot networking
WinMagic launched SecureDoc with PBConnex, a full-disk encryption solution with pre-boot networking. PBConnex, an extension to SecureDoc, fully integrates network support …
CSA releases Cloud Controls Matrix 1.2
The Cloud Security Alliance (CSA) launched revision 1.2 of the Cloud Controls Matrix (CCM), available for free here. The CCM is designed to provide fundamental security …
Week in review: Digital forensics, new Facebook Privacy Settings and RSA phishing email found
Here’s an overview of some of last week’s most interesting news, articles and videos: Chinese mobile phone monitoring service found What do you think cyber crooks …
Microsoft updates free security tools
Microsoft enhanced three of its free Security Development Lifecycle (SDL) tools – Threat Modeling, MiniFuzz, and RegExFuzz. Threat Modeling Tool 3.1.8 The Threat …
The Basics of Digital Forensics
The Basics of Digital Forensics will provide a foundation for people new to the digital forensics field. This book will teach people how to conduct examinations by discussing …
Cisco Certified Technician: New entry-level certification
Cisco introduced the Cisco Certified Technician (CCT) to its Career Certification Program. The CCT training and certification programs are designed for technicians who perform …
Cyber threat protection for enterprise networks
Damballa released Failsafe 4.2, an advance in detecting criminal command-and-control behavior in corporate networks. Failsafe pinpoints corporate assets under criminal …
CompTIA expands Security Trustmark Program
CompTIA expanded its Security Trustmark program to include two levels of the business accreditation, which identifies companies that follow industry-accepted best security …
Featured news
Resources
Don't miss
- Security work keeps expanding, even with AI in the mix
- Ivanti provides temporary patches for actively exploited EPMM zero-day (CVE-2026-1281)
- Google disrupts proxy network used by 550+ threat groups
- eScan AV users targeted with malicious updates
- Google agrees to pay $135 million over Android data harvesting claims