Help Net Security
Week in review: Kaspersky hacked, Facebook privacy breach and the rise of Java exploits
Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: Facebook apps send user information to ad agencies Various …
RSYaba: Modular brute force attacker
RSYaba allows you to run brute force attacks against various services in a similar way to Hydra and Medusa. The tool is written in Ruby so modifying the scripts is a lot …
Five tips for safe computer use
Panda Security released a list of the top five tips that computer users should follow to ensure a safe and secure online experience. With the exponential growth of social …
Open source cloud alternative
Open source cloud computing platform OpenStack announced the “Austin” code release of Compute and Object Storage. Since the project’s inception three months …
Adobe patches InDesign
An important library-loading vulnerability has been identified in Adobe InDesign CS5 7.0.2 and earlier, InDesign Server CS5 7.0.2 and earlier, and InCopy CS5 7.0.2 and …
Integrating Hydra with Nessus
The video below shows you how to integrate custom username and password dictionaries with Hydra to your Nessus scans.
Apple updates Java for Mac OS X 10.5 and 10.6
The latest Java updates from Apple deliver improved reliability, security, and compatibility. Java for Mac OS X 10.5 Update 8 supersedes all previous updates of Java for Mac …
FBI warns businesses about corporate account take overs
The FBI has issued a fraud advisory to warn businesses about the various bank fraud scams currently employed. Created by financial institutions, industry trade associations, …
IBM improves cloud security
IBM unveiled a new security initiative focused on making cloud computing safer. IBM aims to help both users and providers of cloud computing more easily navigate security …
Global e-crime gang transitions to crimeware
The world’s most prolific phishing gang has completed a transition from using conventional phishing to massively propagating stealthy password-stealing crimeware that …
IEEE 802.16m approved as IMT-Advanced technology
The WiMAX Forum today recognizes the decision within the International Telecommunication Union (ITU) approving the “WirelessMAN-Advanced” technology of IEEE …
Metasploit Framework 3.5.0 comes with over 600 exploits
The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration …
Featured news
Resources
Don't miss
- Critical Veeam Backup & Replication RCE vulnerability fixed, patch ASAP! (CVE-2025-23120)
- RansomHub affiliate leverages multi-function Betruger backdoor
- Kali Linux 2025.1a drops with theme refresh, Kali NetHunter updates
- 5 pitfalls that can delay cyber incident response and recovery
- How healthcare CISOs can balance security and accessibility without compromising care