Help Net Security
Tool to test regular expressions for DoS vulnerabilities
Regular expression patterns containing certain clauses that execute in exponential time (for example, grouping clauses containing repetition that are themselves repeated) can …
Accelerate patching progress in the enterprise
At RSA Conference 2010 Europe last week, Qualys CTO Wolfgang Kandek gave a presentation on how to accelerate the patching progress in the enterprise. It contains example of …
Private key management: Real world tips
It has always been taken for granted that the entire IT security industry understands that, as part of digital certificate management, it is necessary to manage the private …
Nuclear site’s operation details found on lost USB stick?
Reports are coming in that an unencrypted USB stick – apparently containing details on the Sellafield nuclear site’s operations – was found by a coach driver …
78% of organizations experienced downtime due to mismanaged encryption
Encryption key and digital certificate inventories are rising, according to a study by Venafi. Poorly managed encryption leads to system downtime, non-compliance and audit …
Adobe to release more secure PDF reader
Adobe is announcing the new Acrobat X Family of Products which includes Adobe Reader X as well as Acrobat X Suite, Acrobat X Pro, and Acrobat X Standard. Reader X is the only …
Fraud losses increase by 20% in the past 12 months
Theft of information and electronic data at global companies has overtaken physical theft for the first time, according to the Kroll Annual Global Fraud Report. The study …
A cyber criminal’s key to vulnerable systems
New, advanced evasion techniques (AET) that can pose a serious threat to existing network security systems worldwide, according to Stonesoft. These AET threats significantly …
Week in review: Cloud security, patching challenges and RSA Conference 2010 news
Week in review: Here’s an overview of some of last week’s most interesting news, interviews, articles, reviews and podcasts: A foolproof drive-by-download blocking …
BlackBerry patches Enterprise Server
A vulnerability in the BlackBerry Attachment Service component of the BlackBerry Enterprise Server could allow a malicious individual to cause buffer overflow errors, leading …
Requirements of cloud-based network security
While some of the technical underpinnings that make up the cloud’s “secret sauce’, are relatively recent innovations, the business case for managing critical …
5 tips for protecting against spam attacks
Whether you’re at work or at home, spam causes headaches and wastes time, forcing you to trawl through your inbox to work out which mail is legitimate and which is spam. …
Featured news
Resources
Don't miss
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!