Help Net Security
Browser-enforced mitigation against CSRF
This is a video of a talk by Lieven Desmet and Philippe De Ryck at OWASP AppSec Research 2010.
Reporting of security breaches should be included in regular reports
Reports that a leading legal expert has called for the mandatory reporting of all data breaches to the UK Information Commissioner’s Office (ICO) – in order to …
Snort 2.8.6.1 released
Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol …
New book: “Ubuntu for Non-Geeks, 4th Edition”
Ubuntu has been hailed as the Linux distribution for newbies, but getting it up and running isn’t always a walk in the park. Linux is different—but the same unique …
The modern network security landscape
Businesses must change their mindset on security to help ensure that their networks and vital corporate information are protected from evolving security threats, according to …
1.2 million infected by Eleonore exploits toolkit
AVG’s Web security research team has discovered a network of 1.2 million malware-infected computers controlled by cybercriminals who were using the Eleonore exploit …
Security risk tool for healthcare
Whenever there is a security breach of any size involving protected health information (PHI), the healthcare industry is now required under the HITECH Act to complete an …
Time to end the proliferation of passwords in the cloud
Cloud computing promises to free applications from vendor lock-in and the confines of company walls. Business is on the move with laptops, smart phones, and tablets. Access to …
Stuxnet malware and default SCADA passwords put critical infrastructure at risk
Sophos has issued new guidance and research on a Windows zero-day vulnerability that is already being used to target critical infrastructure systems, and for which exploit …
“OMG mother went to jail” Facebook scam spreads virally
Sophos is warning Facebook users about a new scam that is spreading quickly across the social network pretending to be a link to a photograph of a baby boy taken by his …
Active Directory-based authentication for Linux and Mac OS X
Centrify Express is a set of free software applications and tools, content resources and community forums designed to help organizations improve security and compliance of …
Free secure browser protects against security attacks
The Dell KACE Secure Browser uses application virtualization technology to provide an isolated instance of Firefox to secure what has become a common entry point for malware. …
Featured news
Resources
Don't miss
- Why your security team feels stuck
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)