Help Net Security
DEFCON survey reveals vast scale of cloud hacking
An in-depth survey carried out amongst 100 of those attending this year’s DEFCON conference in Las Vegas recently has revealed that an overwhelming 96 percent of the …
Security-focused distro NetSecL 3.0 released
NetSecL 3.0 is a live DVD + installation based on OpenSuse. Once installed you can fully enjoy the features of GrSecurity hardened kernel and penetration tools or if you like …
Universities should secure their online platforms and applications
Schools, colleges and universities as well as their students should be more careful and aware of security issues when using online platforms for educational purposes. To …
OpenSSH 5.6 released
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. It encrypts all traffic (including passwords) to …
New data breach legislation
In the past two months, there have been two bills introduced in Washington, D.C. that are attempting to set nationwide standards for the security and privacy of …
Disk encryption software Cryptic Disk 3.0 released
Exlade released Cryptic Disk 3.0 which allows users to create virtual encrypted disks as well as encrypt hard disks, drive partitions, USB drives and memory cards. The …
Week in review: Russian hackers’ identikit, DDoS spam and Android spying app
Here’s an overview of some of last week’s most interesting news, videos and articles: Who is the typical Russian hacker? Two security researchers have spent 6 …
Adobe releases Acrobat, Reader security updates
New versions of Adobe Reader (9.3.4) and Acrobat (9.3.4, 8.2.4) have been released today in order to patch critical vulnerabilities in earlier versions of the two programs for …
Intel to acquire McAfee
Intel Corporation has entered into a definitive agreement to acquire McAfee for approximately $7.68 billion. Both boards of directors have unanimously approved the deal, which …
Top 10 most dangerous celebrity searches
Cameron Diaz has replaced Jessica Biel as the most dangerous celebrity to search for on the Web, according to security company McAfee. The company researched popular …
Oracle interrupted: Stealing sessions and credentials
In this video from OWASP AppSec Research 2010, Wendel G. Henrique and Steve Ocepek from Trustwave look at Oracle sessions and credentials, take them apart and take them over.
FGET: Network-capable forensic data acquisition tool
FGET which is short for “Forensic Get” is a network-capable forensic data acquisition tool. It’s primary function is collecting sets of forensically …
Featured news
Resources
Don't miss
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!