Help Net Security
Splunk 4.2 released
Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. Splunk 4.2 …
Complexity as the leading security issue
Security complexity is the number one obstacle that organizations face today. Research from Check Point and the Ponemon Institute shows organizations struggle with a growing …
F-Secure Policy Manager 10 released
Effective security management of corporate computers and servers is all about the consistency, speed and efficiency of operations. Policy Manager 10 automates daily operations …
Critical vulnerability in Adobe Flash Player
A critical vulnerability exists in Adobe Flash Player 10.2.152.33 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems (Adobe Flash Player …
Medical identity theft: The growing cost of indifference
While consumers grasp the importance of protecting their medical and personal information, few individuals take the necessary precautions to avoid medical identity theft, …
Internet Explorer 9 delivers improved security
Microsoft released Internet Explorer 9 today. This release improves security, privacy and reliability. Tracking protection. Some content on websites can be used to track your …
40th anniversary of the computer virus
This year marks the 40th anniversary of Creeper, the world’s first computer virus. From Creeper to Stuxnet, the last four decades saw the number of malware instances …
HoneyPoint Wasp: Monitor the security of Windows environments
MicroSolved announced a new version of HoneyPoint Wasp 1.50 which gives more capability to the security team to easily gain visibility into Windows systems and more power to …
Week in review: Poisoned Japan earthquake search results, open source exploit kit and new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: The importance of metadata to prevent data leaks A new IDC report highlights how the …
Best practices for identity theft services
With security breaches and identity theft cases frequently in the news, consumers are worried about becoming identity theft victims. Responding to this concern, dozens of …
Brain: Searching for the first PC virus in Pakistan
Here is a 10-minute video reportage about Mikko Hypponen’s trip to Lahore, Pakistan, to find the authors of the first PC virus “Brain”. This is the first …
Most sites are exposed to at least one vulnerability each day
The average website has serious vulnerabilities more than nine months of the year and data leakage has over taken cross site scripting as the most common website …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation