Help Net Security
Over 200 websites use Justin Bieber as bait to distribute malware
PandaLabs detected more than 200 spoof Web addresses using the name of Justin Bieber as bait to lure users. By including the name of this popular singer in malicious links, …
WhatWeb: Fingerprint Web servers and applications
WhatWeb allows you to identify content management systems, blogging platforms, stats/analytics packages, javascript libraries, servers and more. When you visit a website in …
Millions of ColdFusion users still at serious risk
Millions of users of Adobe’s ColdFusion programming language are still at risk of losing control of their applications and websites. Out of the twenty two corporate …
Facebook Hacker: A dangerous tool
Phishing is known to be the weapon of choice for all cybercriminals that are after login credentials. However, a new attack tool – Facebook Hacker – has drawn …
Secure remote access for Mac users
HOB launched MacGate, a new secure remote access solution designed specifically for Mac users. It provides users with access to computers running Mac, especially graphics …
HP to acquire Fortify Software
HP and Fortify Software have entered into a definitive agreement under which HP will acquire Fortify Software. Terms of the deal were not disclosed. With the acquisition of …
Publicly trusted secure e-mail certificates
Entrust adds publicly trusted secure e-mail certificates to its certificate management service, enabling digital signature capabilities and encryption of e-mails and other …
ClamAV for Windows 2.0 released
ClamAV for Windows 2.0 is designed to provide the ClamAV community with a Windows AV solution incorporating all the standard desktop AV features one would expect from any …
Deconstructing ColdFusion
In this video from OWASP AppSec Research 2010, Chris Eng from Veracode provides a practical guide for those doing penetration testing or code reviews on an application written …
BitDefender Total Security 2011 released
BitDefender announced the launch of Total Security 2011, which offers protection against viruses, spyware, phishing and identity theft attacks. It includes antivirus, firewall …
Five imperatives for extreme data protection in virtualized environments
Transforming an organization through server virtualization requires a strategic and coordinated approach. Data protection – which includes not only backup, but also …
Fake dislike button Facebook scam
Facebook users should be wary of the latest survey scam spreading virally across the network. There are a number of variations of this scam, which sees users unwillingly …
Featured news
Resources
Don't miss
- OpenAI’s gpt-oss-safeguard enables developers to build safer AI
- Sanctions won’t stop cyberattacks, but they can still “bite”
- Python Foundation rejects US government grant earmarked for security improvements
- AI agents can leak company data through simple web searches
- Early reporting helps credit unions stop fraudulent transfers faster