Help Net Security
IEEE launches 40Gb/s ethernet optical interface standard
IEEE announced the ratification of IEEE 802.3bgTM-2011, 40Gb/s Ethernet Single-mode fiber optical interface, a new standard enabling 40 Gb/s serial Ethernet interfaces to be …
New HP application security solutions
HP announced the first application security analysis solution that discovers the root cause of software vulnerabilities by observing attacks in real-time. HP Fortify Real-Time …
B-Sides Vienna welcomes hackers in June
B-Sides Vienna is a hacker conference targeted at security researchers, system and network operators, application developers, hardware hackers, hackerspace members, and …
Maturity model for information security management
The Open Group announced a new information security management standard, The Open Group Information Security Management Maturity Model (O-ISM3), which enables the creation of …
Network security blunders: Tales from the field
We’ve all made one in our career, I’m talking about that blunder you thought you would be fired for. My first blunder was rebooting all the campus router pairs at …
Week in review: Epsilon breach, MITM attacks and the execution of the RSA hack
Here’s an overview of some of last week’s most interesting news, reviews, videos and articles: The execution of the RSA hack More than two weeks have passed since …
Cain & Abel 4.9.40 released
Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …
Hacking Unified Communications security
A fundamental shift in the IT security world has taken place. It is the common thread running through these real-world case studies: 1. An enterprise telecoms manager at a …
Uptick in rogue Facebook applications
GFI Software announced the top 10 most prevalent malware threats for the month of March 2011. GFI researchers found that the Japanese tsunami, earthquake and subsequent …
Smartphone users feel more secure than PC users
Many users feel more secure using smartphones to surf the Internet than PCs, and a majority consider the risk of losing personal data higher on computers than on smartphones, …
AVG unveils secure cloud-based storage
AVG Technologies launched AVG LiveKive, a cloud-based storage, sync and share solution. It offers consumers a way to access their personal information, data, files and digital …
Multiple vulnerabilities in Moonlight
Some vulnerabilities have been reported in Moonlight, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security …
Featured news
Resources
Don't miss
- Booking.com data breach: Customer reservation data exposed
- AI adoption is outpacing the safeguards around it
- Agentic AI memory attacks spread across sessions and users, and most organizations aren’t ready
- Review: The Psychology of Information Security
- 29 million leaked secrets in 2025: Why AI agents credentials are out of control