Help Net Security
Metasploit achieves CVE compliance
Rapid7 announced that Metasploit Pro and Metasploit Express have achieved Common Vulnerabilities and Exposures (CVE) compliance. CVE associates unique identifiers to security …
Use Android as a RSA SecurID authenticator
RSA announced their SecurID Software Token for Android that is engineered to enable an Android powered device to be used as an RSA SecurID authenticator, providing convenient …
First 1TB 2.5-inch enterprise HDD
Seagate introduced Constellation.2, the first 2.5-inch enterprise-class hard drive to reach 1TB capacity. The drive is designed for server storage applications and offers a …
Data privacy a primary concern in the smart grid world
Privacy has emerged as the number one concern related to data security and management, with data governance as an emerging concern, according to IDC Energy Insights. As …
Operation Payback and hacktivism 101
Hacktivism is the use of cyber attacks and sabotage to communicate and promote politically motivated causes. It has been around as long as the internet. Sole hacktivists have …
Data protection compliance in the EU administration
The European Data Protection Supervisor (EDPS) adopted a policy paper that sets out the framework within which he monitors, measures and ensures data protection compliance in …
Gawker Media data breach linked to Twitter spam campaign
A recent security breach at Gawker Media which involved the leaking of user passwords for sites such as Gizmodo and Lifehacker, has now been linked to a widespread spam …
Multiple vulnerabilities in RealPlayer
Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user’s system, according to Secunia. Users should …
McDonald’s customer data compromised
If you previously elected to submit information to McDonald’s in connection with one of their websites or promotions, there is a possibility that information you …
Week in review: Assange arrested, 2011 threat landscape and first VoIP call from space
Here’s an overview of some of last week’s most interesting news and articles: McAfee’s Secure Short URL Service not so secure M86 Security Labs’ …
Security, is there an app for that?
Smartphones are now an essential tool across all sections of society, from top government officials to businesses and consumers. If you are one of the hundreds of millions of …
Underground toolkits will make cyber espionage easy
With the growing diversity of operating systems among companies, as well as the growing use of mobile devices, cybercriminals should have a very profitable 2011. Their tactic …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations