Help Net Security
Splunk 4.1.1 brings 90+ fixes
Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. The following …
Identifying suspicious URLs
This video explores online learning approaches for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated …
Emerging threats in the end user environment
New social networking technologies, mobile devices and a more flexible and tech-savvy workforce are leading to increasingly complex and diverse end user environments with many …
Open source IDS Suricata 1.0 released
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. Suricata is the result of …
Free browser security testing service
Qualys announced a free service, Qualys BrowserCheck, that scans web browsers looking for security flaws within the browser and its plug-ins. Security flaws in modern web …
10 steps for safe web surfing
For the millions heading out on vacations ranging from long-distance travel to short daytrips to the beach, or finalizing plans for them, the Internet is an important …
Nmap 5.35DC1 released
Nmap is a free and open source utility for network exploration or security auditing. Nmap 5.35DC1 includes 131 NSE scripts (17 new), 6,622 version detection signatures, 2,608 …
Personal identity protection from McAfee
McAfee launched McAfee Identity Protection, one of the most comprehensive and easy to use identity protection services on the market. The product features proactive identity …
IBM delivers proactive network security
As today’s threat landscape continues to evolve and become more complex, IBM is introducing a new security appliance to help clients more easily adopt an IT …
Top 12 spam-relaying countries
Sophos has published its latest report into the top twelve spam-relaying countries, covering the second quarter of 2010. The United States continues to be the number one spam …
Week in review: New ZeuS version and multi-stage attacks cyber attacks
Here’s an overview of some of last week’s most interesting news and articles: When identity theft is not your fault It is definitely true that you should be …
Can you trust a product that doesn’t have the right certification?
There are numerous organizations who, when looking for a new solution, will draw up a list of attributes products must have to proceed to the evaluation phase. FIPS …
Featured news
Resources
Don't miss
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!
- Crypto-stealing iOS, Android malware found on App Store, Google Play