Help Net Security
Botnets battling for digital real estate
April saw high activity from multiple botnets, namely Gumblar and Sasfis, according to a report by Fortinet. While Gumblar remained in the No. 1 position in Fortinet’s …
Rogue software details: RST Antivirus 2010
RST Antivirus 2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Wireshark 1.2.8 released
Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. The following bugs have been fixed: HTTP parser limits …
Suricata: Network intrusion detection and prevention engine
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded …
Firewall Builder 4.0 released
Firewall Builder helps you write and manage configuration for your firewalls. It writes iptables commands, pf.conf file, Cisco router access lists or PIX configuration for …
Security risks of web application programming languages
A new WhiteHat report examined the security of specific programming languages. Until now, no other website security study has provided detailed research on how programming …
Freeware detects performance loss across the network
Disk Performance Analyzer for Networks 3.0 (DPAN) is a free utility that detects and reports severe fragmentation-related performance loss across the network, all from one …
Facebook Social Plug-ins privacy concerns sorted out by Palo Alto Networks
Facebook users in enterprises are susceptible to having their confidential data shared with third parties because of recent changes at Facebook, which cause behavioral data …
Fake Adobe Security Update malware campaign
Red Condor issued a warning of a new malware threat crafted to appear as an email thread discussing vulnerabilities in Adobe software. The campaign targets Adobe customers and …
Compliance Enforcer 3.0 released
Compliance Enforcer 3.0 leverages nexTier’s DLP algorithms with semantic analysis to provide end-users with auto-classification features, the ability to customize …
Qualys and RSA expand IT-GRC collaboration
Qualys and RSA expanded their technology collaboration to make QualysGuard vulnerability management and IT policy compliance data available to RSA’s client base. The …
Analyze the network behavior of unknown malware samples
The aim of the INetSim project is to perform a quick run-time analysis of the network behavior of unknown malware samples in a laboratory environment. Modules for the …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption