Help Net Security
Employees admit they would steal data when leaving a job
Employees openly admit they would take company data, including customer data and product plans, when leaving a job, according to Harris Interactive. The online survey probed …
Over 200 websites use Justin Bieber as bait to distribute malware
PandaLabs detected more than 200 spoof Web addresses using the name of Justin Bieber as bait to lure users. By including the name of this popular singer in malicious links, …
WhatWeb: Fingerprint Web servers and applications
WhatWeb allows you to identify content management systems, blogging platforms, stats/analytics packages, javascript libraries, servers and more. When you visit a website in …
Millions of ColdFusion users still at serious risk
Millions of users of Adobe’s ColdFusion programming language are still at risk of losing control of their applications and websites. Out of the twenty two corporate …
Facebook Hacker: A dangerous tool
Phishing is known to be the weapon of choice for all cybercriminals that are after login credentials. However, a new attack tool – Facebook Hacker – has drawn …
Secure remote access for Mac users
HOB launched MacGate, a new secure remote access solution designed specifically for Mac users. It provides users with access to computers running Mac, especially graphics …
HP to acquire Fortify Software
HP and Fortify Software have entered into a definitive agreement under which HP will acquire Fortify Software. Terms of the deal were not disclosed. With the acquisition of …
Publicly trusted secure e-mail certificates
Entrust adds publicly trusted secure e-mail certificates to its certificate management service, enabling digital signature capabilities and encryption of e-mails and other …
ClamAV for Windows 2.0 released
ClamAV for Windows 2.0 is designed to provide the ClamAV community with a Windows AV solution incorporating all the standard desktop AV features one would expect from any …
Deconstructing ColdFusion
In this video from OWASP AppSec Research 2010, Chris Eng from Veracode provides a practical guide for those doing penetration testing or code reviews on an application written …
BitDefender Total Security 2011 released
BitDefender announced the launch of Total Security 2011, which offers protection against viruses, spyware, phishing and identity theft attacks. It includes antivirus, firewall …
Five imperatives for extreme data protection in virtualized environments
Transforming an organization through server virtualization requires a strategic and coordinated approach. Data protection – which includes not only backup, but also …
Featured news
Resources
Don't miss
- Cryptomixer crypto laundering service taken down by law enforcement
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security
- Enterprise password audits made practical for busy security teams
- What zero trust looks like when you build it step by step