Help Net Security
IronBee versus ModSecurity
After spending a couple of weeks talking about IronBee to anyone willing to listen, I have assembled a list of commonly asked questions. Not unexpectedly, the question that …
LotusCMS multiple vulnerabilities
A weakness and multiple vulnerabilities have been discovered in LotusCMS, which can be exploited by malicious users to disclose sensitive information and compromise a …
How antivirus and antispyware help keep malware at bay
When it comes to creating Internet security threats, malware writers are masters of disguise and manipulation. They are constantly evolving their tactics to find new ways to …
Health Net suffers massive data breach
Health Net is conducting an investigation into several server drives that are unaccounted for from its data center operation located in Rancho Cordova, Calif. This …
Splunk 4.2 released
Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. Splunk 4.2 …
Complexity as the leading security issue
Security complexity is the number one obstacle that organizations face today. Research from Check Point and the Ponemon Institute shows organizations struggle with a growing …
F-Secure Policy Manager 10 released
Effective security management of corporate computers and servers is all about the consistency, speed and efficiency of operations. Policy Manager 10 automates daily operations …
Critical vulnerability in Adobe Flash Player
A critical vulnerability exists in Adobe Flash Player 10.2.152.33 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems (Adobe Flash Player …
Medical identity theft: The growing cost of indifference
While consumers grasp the importance of protecting their medical and personal information, few individuals take the necessary precautions to avoid medical identity theft, …
Internet Explorer 9 delivers improved security
Microsoft released Internet Explorer 9 today. This release improves security, privacy and reliability. Tracking protection. Some content on websites can be used to track your …
40th anniversary of the computer virus
This year marks the 40th anniversary of Creeper, the world’s first computer virus. From Creeper to Stuxnet, the last four decades saw the number of malware instances …
HoneyPoint Wasp: Monitor the security of Windows environments
MicroSolved announced a new version of HoneyPoint Wasp 1.50 which gives more capability to the security team to easily gain visibility into Windows systems and more power to …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations