Help Net Security
All versions of Internet Explorer under threat
Today Microsoft released a new security advisory to help protect users from a vulnerability affecting Internet Explorer versions 6, 7, and 8. Exploiting this vulnerability …
Steganos Privacy Suite 12 released
The latest version of the all-in-one data protection software, Steganos Privacy Suite 12, combines eight tools for optimizing user privacy protection, including: data …
Win a copy of Practical Lock Picking!
We are giving away two copies of “Practical Lock Picking“. For the first time, Deviant Ollam, one of the security industry’s best-known lockpicking teachers, …
Tips for creating a strong password
To ensure consumers stay safe online and enjoy this holiday season, Check Point outlines practical tips for creating a strong password. Choose a password that is at least 8 to …
Threat modeling best practices
In the video below, Robert Zigweid, senior security consultant at IOActive, talks about threat modeling best practices. The video was recorded at the OWASP AppSec USA 2010 …
Highest profile software failures of 2010
SQS Software Quality Systems compiled a list of the worst software failures of 2010 that have damaged reputations, impacted negatively on finances and caused stress to users. …
Passwords are the weakest link in online security
A ZoneAlarm survey showed that 79% of consumers use risky password construction practices, such as including personal information and words. The survey also revealed that 26% …
The shape of security and compliance in 2011
With increasingly stringent compliance mandates, a flurry of vendor consolidation, demands for audit reporting, and a spike in complex security breaches, 2010 has been a …
Rapid7 releases NeXpose 4.10
Rapid7 announced NeXpose 4.10, the latest version of its vulnerability management solution, providing enterprise customers with visibility and actionable intelligence for …
Web-based stealth attacks on network security will dominate 2011
Viruses will become more subtle and even harder to detect in 2011, and the primary line of attack will continue to be via the internet, according to Redscan. Malware is now …
Cisco IOS penetration testing with Metasploit
The Metasploit Framework and the commercial Metasploit products have always provided features for assessing the security of network devices. With the latest release, we took …
Virus yearbook 2010: Mariposa, Stuxnet and MSNWorm most noteworthy
PandaLabs is closing the year with a look at some of the unique and noteworthy viruses that have appeared over the last twelve months. The list of viruses is vast and varied, …
Featured news
Resources
Don't miss
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring
- Microsoft 365 users targeted in device code phishing attacks
- More than half of public vulnerabilities bypass leading WAFs
- The soft underbelly of space isn’t in orbit, it’s on the ground
- Privacy risks sit inside the ads that fill your social media feed