Help Net Security
Riverbed acquires CACE Technologies
Riverbed Technology announced the acquisition of CACE Technologies, a leader in packet capture and analysis products for wireless and wireline networks and the corporate …
Week in review: Kaspersky hacked, Facebook privacy breach and the rise of Java exploits
Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: Facebook apps send user information to ad agencies Various …
RSYaba: Modular brute force attacker
RSYaba allows you to run brute force attacks against various services in a similar way to Hydra and Medusa. The tool is written in Ruby so modifying the scripts is a lot …
Five tips for safe computer use
Panda Security released a list of the top five tips that computer users should follow to ensure a safe and secure online experience. With the exponential growth of social …
Open source cloud alternative
Open source cloud computing platform OpenStack announced the “Austin” code release of Compute and Object Storage. Since the project’s inception three months …
Adobe patches InDesign
An important library-loading vulnerability has been identified in Adobe InDesign CS5 7.0.2 and earlier, InDesign Server CS5 7.0.2 and earlier, and InCopy CS5 7.0.2 and …
Integrating Hydra with Nessus
The video below shows you how to integrate custom username and password dictionaries with Hydra to your Nessus scans.
Apple updates Java for Mac OS X 10.5 and 10.6
The latest Java updates from Apple deliver improved reliability, security, and compatibility. Java for Mac OS X 10.5 Update 8 supersedes all previous updates of Java for Mac …
FBI warns businesses about corporate account take overs
The FBI has issued a fraud advisory to warn businesses about the various bank fraud scams currently employed. Created by financial institutions, industry trade associations, …
IBM improves cloud security
IBM unveiled a new security initiative focused on making cloud computing safer. IBM aims to help both users and providers of cloud computing more easily navigate security …
Global e-crime gang transitions to crimeware
The world’s most prolific phishing gang has completed a transition from using conventional phishing to massively propagating stealthy password-stealing crimeware that …
IEEE 802.16m approved as IMT-Advanced technology
The WiMAX Forum today recognizes the decision within the International Telecommunication Union (ITU) approving the “WirelessMAN-Advanced” technology of IEEE …
Featured news
Resources
Don't miss
- Portmaster: Open-source application firewall
- Google fixes Android vulnerabilities “under targeted exploitation” (CVE-2025-48633, CVE-2025-48572)
- How a noisy ransomware intrusion exposed a long-term espionage foothold
- Creative cybersecurity strategies for resource-constrained institutions
- Product showcase: UserLock IAM for Active Directory