Help Net Security
VirtualBox: Full virtualizer for x86 hardware
VirtualBox is an open source general-purpose full virtualizer for x86 hardware, targeted at server, desktop and embedded use. Some of the features of VirtualBox are: …
How to render SSL useless
In this video from OWASP AppSec Research 2010, Ivan Ristic from Qualys talks about breaking SSL.
Week in review: Signs of computer infection, iPhone jailbreaking and Facebook mobile privacy
Here’s an overview of some of last week’s most interesting news and videos: Web 2.0 security in the workplace The use of social networking applications has …
Facebook virus hoax spreading rapidly
Sophos is advising Facebook users to think before passing on a virus warning that is rapidly spreading across the social network. A large number of users are currently …
Microsoft Exchange Server 2010 Best Practices
Apply best practices for administering Exchange Server 2010 and SP1 and optimize your operational efficiency. Microsoft Exchange Server 2010 Best Practices captures the …
Managed DNS Service integrate DNS, DHCP and IPAM
BlueCat Networks launched Proteus Cloud Services, a managed DNS service that provides control and central management of external DNS as well as enabling organizations to …
Fighting illegal content on the Internet
Detective Sergeant Michael Moran specializes in the domain of online child exploitation and in his address to the Institute, he focused on Interpol’s role in the fight …
How can I know if my computer is infected? 10 signs of infection
Users are often advised to use an antivirus to check if their systems are infected, but with the current cyber-crime scenario, this is simply not enough. Frequently, it takes …
Remote monitoring tool for social networking activity
Awareness Technologies has expanded its WebWatcher monitoring tool for the social media platforms Facebook and MySpace. WebWatcher allows users to install the software and …
Top 5 undiscovered vulnerabilities found on enterprise networks
A report by Lumeta highlights the five most prevalent undiscovered or unknown vulnerabilities commonly found on enterprise networks. 1. Incorrect or incomplete deployments of …
Win a copy of “Nmap Network Scanning” or “Hacking Exposed: Windows Forensics”
If you win, we will e-mail you on August 13. Our weekly newsletter is packed with information security news. You will receive it every Monday morning.
IP-based control over enterprise networks
Cloud Systems announced the release of atmospherics 2.3 which executes control of any networked infrastructure from any device with a web browser. Atmospherics 2.3 allows …
Featured news
Resources
Don't miss
- TeamPCP’s attack spree slows, but threat escalates with ransomware pivot
- Critical Fortinet FortiClient EMS bug under active attack (CVE-2026-21643)
- Why risk alone doesn’t get you to yes
- ShipSec Studio brings open-source workflow orchestration to security operations
- Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521)