Help Net Security
It’s time to be proactive on cybersecurity
In light of recent cyberespionage, the breakup of cybercrime rings, and the threats that sophisticated malware such as Stuxnet present to critical infrastructures, McAfee Labs …
6 million malicious files found in the past 3 months
Malware has reached its highest levels, making the first six months of 2010 the most active half-year ever for total malware production, according to a new McAfee report. At …
Security check for broadband home routers
Attackers are increasingly targeting home routers as a means of gaining access to sensitive personal data. To help combat this threat, ICSA Labs is offering a new program …
64GB secure portable USB drive
MXI Security offers a 64GB capacity device for its Stealth line of secure USB devices, suited for government customers that require high-capacity devices for Secure USB …
Gartner: Worldwide enterprise IT spending to grow
Worldwide enterprise IT spending across all industry markets will grow 2.9 percent in 2010 and surpass $2.4 trillion, according to Gartner. Analysts said that all industries …
Wipe technology for self-encrypting disk drives
Toshiba announced Wipe for Toshiba Self-Encrypting Drive (SED) models, a technology that allows special security capabilities, such as the world’s first ability for …
Tektronix Communications acquires Arbor Networks
Tektronix Communications has signed a definitive agreement to acquire Arbor Networks. The acquisition is expected to close in September and the terms of the acquisition are …
New web application firewalls from Fortinet
Fortinet announced two new appliances for its FortiWeb family of web application firewalls – the FortiWeb-1000C, designed for mid-to-large enterprises, and …
Free protection against Blackhat SEO threats
Zscaler released Search Engine Security (SES), a free solution specifically designed to combat Blackhat SEO attacks. Such attacks leverage Search Engine Optimization (SEO) …
Colleges breach students’ sensitive information
College students nationwide can be especially vulnerable to identity theft because they often give out personally identifiable information. Some universities have even been …
VirtualBox: Full virtualizer for x86 hardware
VirtualBox is an open source general-purpose full virtualizer for x86 hardware, targeted at server, desktop and embedded use. Some of the features of VirtualBox are: …
How to render SSL useless
In this video from OWASP AppSec Research 2010, Ivan Ristic from Qualys talks about breaking SSL.
Featured news
Resources
Don't miss
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!
- Crypto-stealing iOS, Android malware found on App Store, Google Play