Help Net Security
Microsoft Web Application Configuration Analyzer 2.0 released
Web Application Configuration Analyzer (WACA) is a tool that scans a server against a set of best practices recommended for pre-production and production servers. The list of …
A guideline for critical information infrastructure governance
ENISA launched a new publication on National Risk Management (NRM) preparedness. The report sets out the essential elements as a guideline for the governance of NRM in …
SpyEye Trojan attacks Verizon’s online payment page
Trusteer discovered a configuration of the SpyEye Trojan targeting Verizon’s online payment page and attempting to steal payment card information. The attack took place …
Worrying trend in credit card data security
A new BitDefender study which has revealed some concerning statistics on the personal protection of credit card data. 97% of 2,210 respondents aged 18 to 65 said they …
New vulnerability reporting framework
The Industry Consortium for Advancement of Security on the Internet (ICASI) published of its Common Vulnerability Reporting Framework (CVRF) Version 1.0. CVRF is an XML-based …
Microsoft Forefront Endpoint Protection 2012 Beta released
Microsoft released Forefront Endpoint Protection 2012 Beta which continues to provide proactive protection against known and unknown threats using multiple technologies in the …
Mobile Encryption for iOS and Android
Sophos announced a number of new enterprise product lines that together offer protection anywhere and on any device. Sophos Mobile Control provides lightweight device …
VirtualBox 4.0.8 released
VirtualBox enables desktop or laptop computers to run multiple operating systems simultaneously, and supports a variety of host operating systems, including Windows, Mac OS X, …
IBM Informix Storage Manager security bypass
A vulnerability has been reported in IBM Informix Storage Manager, which can be exploited by malicious people to bypass certain security restrictions, according to Secunia. …
Microsoft investigates the current threat landscape
Microsoft published volume 10 of the its Security Intelligence Report (SIRv10) which provides perspectives on software vulnerabilities, software vulnerability exploits, …
VMware acquires Shavlik Technologies
VMware has entered into a definitive agreement to acquire Shavlik Technologies, which provides a portfolio of on-premise and SaaS-based management solutions that enable SMBs …
iPhone-enabled wireless multimeter
Redfish Instruments introduced the iDVM Digital Multimeter which wirelessly connects to an iPhone, iPad, or iPod Touch via an ad hoc wireless network allowing users to …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)