Help Net Security
Programmer sentenced for accessing ATMs using malicious code
A former Bank of America (BOA) computer programmer was sentenced to 27 months in federal prison for unauthorized access to the financial institution’s protected …
1.5 billion smart credentials to ship
The increasing use of smart cards and biometric capture has changed the way government and healthcare citizen ID documentation is viewed, managed and deployed. Many …
Week in review: Fox breach, SpyEye targeting Verizon and fake Macs rogueware
Here’s an overview of some of last week’s most interesting news and articles: Five ways to migrate applications to the cloud Organizations seeking to move …
The progress of IT threats in 2010
Cyber criminals have capitalized on the recent growth in popularity of the Android mobile platform. Based on the number of new mobile malware signatures detected during this …
Tool for analysis of DOM based XSS issues
DOMinator is a Firefox based software for analysis and identification of DOM based Cross Site Scripting issues (DOMXss). It is the first runtime tool which can help security …
Best practices to reduce risk in cloud contracts
IT procurement or sourcing managers challenged with finding sourcing options that reduce costs at tolerable risks should examine nine contractual terms to reduce risk in cloud …
nCircle debuts PureCloud security scanning technology
nCircle announced in collaboration with HITRUST the debut of PureCloud, a security scanning technology, and the integration of PureCloud into the HITRUST CSF Assessment for …
Red Hat Enterprise Linux 6.1 released
Red Hat Enterprise Linux 6.1 is now available. Enhancements provide improvements in system reliability, scalability and performance, coupled with support for upcoming system …
OpenSSL weakness can expose sensitive information
A weakness has been reported in OpenSSL, which can be exploited by malicious people to disclose potentially sensitive information, according to Secunia. The weakness is caused …
VM Explorer 3.5 released
VM Explorer is a management tool that eases management, backup and disaster recovery tasks in your VMware ESX environment. Backups can be stored on ESX, Windows, Linux and …
ElcomSoft exposes information in BlackBerry backups
With BlackBerries occupying approximately 40 per cent of the North American market of business communicators and about 20 per cent of the market worldwide, accessing …
Insider threats plague data managers
Financial services organizations struggle with human error, abuse of privileges more than most. Application Security, Unisphere Research, and the International Sybase Users …
Featured news
Resources
Don't miss
- How one quick AI check can leak your company’s secrets
- Salesforce investigates new incident echoing Salesloft Drift compromise
- Security gap in Perplexity’s Comet browser exposed users to system-level attacks
- MacOS DigitStealer malware poses as DynamicLake, targets Apple Silicon M2/M3 devices
- Is your password manager truly GDPR compliant?