Help Net Security
1 in 4 kids have tried hacking
Despite 78% agreeing that it is wrong, 1 in 4 of UK’s children have tried their hand at hacking into others’ Facebook accounts mostly by surreptitiously using the …
Rogue software details: Antivirus 7
Antivirus 7 is a rogue security application. In order to remove it, find out what files to look for below. Known system changes: Files c:\Desktop\Antivirus7.lnk …
Enterprise 2.0 privacy concerns in Europe
Transparent access to people and information is Enterprise 2.0’s great promise. It’s tempered, however, by a privacy risk that is especially sensitive in the …
Cloud-based rapid disaster recovery
Unitrends unveiled its Vault2Cloud disaster recovery service, monitored and managed through a simple, easy-to-use Web 2.0-based user interface. Vault2Cloud solves many of the …
Video: Nessus scan through a meterpreter session
Run a Nessus scan through a compromised host:
New release of RSA Data Loss Prevention Suite
With more than 70 new features for scanning, workflow, reporting, and global content processing, version 8.0 of the RSA Data Loss Prevention (DLP) Suite is engineered to allow …
Virtual PC Hypervisor vulnerability remains unpatched
Core Security issued an advisory disclosing a vulnerability that could affect large numbers of organizations and consumers using Microsoft’s Virtual PC virtualization …
FBI: Online fraud loss was $559 million in 2009
Online crime complaints increased substantially once again last year, according to a report about fraudulent activity on the Internet from the Internet Crime Complaint Center …
Intel launches its most secure data center processor
Combining security, performance and energy efficiency, Intel launched the Intel Xeon Processor 5600 series which deliver two new security features — Intel Advanced …
Six common virtualization security risks and how to combat them
Through 2012, 60 percent of virtualized servers will be less secure than the physical servers they replace, according to Gartner. Although they expect this figure to fall to …
Implement the SSH-2 protocol in pure Java
Ganymed SSH-2 for Java is a library which implements the SSH-2 protocol in pure Java (tested on J2SE 1.4.2 and 5.0). It allows one to connect to SSH servers from within Java …
The smart grid, it’s all about security
All too often you read about security breaches that cost firms millions of dollars or hit individuals with loss of personal data or both. But all this pales in comparison when …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption