Help Net Security
Monitor Mac OS X services on your iPhone or iPad
With Server Admin Remote IT administrators can monitor the alive status of Mac OS X Tiger, Leopard and Snow Leopard Server services, start/stop services and observe the …
Week in review: Social engineering, Facebook clickjacking and a new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: Automated social engineering PoC successful on Facebook and IRC In order to reach a …
Apple updates Mac malware protection
Researchers at Sophos discovered that Apple updated the anti-malware protection built-into Mac OS X when it released a new version earlier this week. Mac OS X 10.6.4 has been …
Microsoft fights online fraud with new program
Microsoft released a new program that will help mitigate potential losses due to online fraud and account compromise. Internet Fraud Alert offers a trusted and effective …
HTTPS Everywhere Firefox extension: Encrypt the Web
HTTPS Everywhere is a Firefox extension produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. It encrypts your communications with a …
Rogue software details: Defense Center
Defense Center is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Security flaws in Orange/France Telecom software
Several independent security researchers reported this past week that security software from Orange/France Telecom, developed to protect consumers from the negative impacts of …
LiveVault 7.0: Application and server backup
Iron Mountain announced LiveVault 7.0, a fully managed, cloud-based data protection solution with proactive administration and monitoring. The latest version of LiveVault …
Juniper Networks releases Junos Pulse and AppTrack software
Juniper Networks announced Junos Pulse and AppTrack software. Junos Pulse is a dynamic, standards-based, integrated multi-service network client that allows the IT staff to …
Enterprise malware threat detection and response
HBGary and Verdasys announced an integrated enterprise security solution to detect and control malware threats. Available in July, the solution will feature HBGary’s …
WordPress 3.0 released
WordPress 3.0, the thirteenth major release of WordPress and the culmination of half a year of work by 218 contributors, is now available for download and comes with 1,217 bug …
Text message phishing attacks drop significantly
Text-to-phone phishing attacks (often called “smishing”) dropped dramatically in the first quarter of 2010, according to a report by Internet Identity (IID). …
Featured news
Sponsored
Don't miss
- Critical Apache OFBiz pre-auth RCE flaw fixed, update ASAP! (CVE-2024-38856)
- Chinese hackers compromised an ISP to deliver malicious software updates
- The role of AI in cybersecurity operations
- How to start your cybersecurity career: Expert tips and guidance
- MISP: Open-source threat intelligence and sharing platform