Help Net Security
New PGP Key Management Server
PGP Corporation announced its new PGP Key Management Server, which delivers open enterprise key and certificate management to global organizations. Deployment and the need to …
Tin Hat: High security Linux
Tin Hat is a Linux distribution derived from hardened Gentoo which aims to provide a very secure, stable and fast Desktop environment that lives purely in RAM. Tin Hat boots …
Week in review: Data breaches, prison terms and cyber attacks
Here’s an overview of some of last week’s most interesting news, articles and videos: Security consultant turned hacker sentenced to 13 years in prison Max Ray …
The state of healthcare privacy in the U.S.
FairWarning commissioned a national survey of healthcare providers. The majority of survey respondents were compliance, privacy or risk personnel, followed by IT management …
Cloud Security Alliance and IEEE join forces
The Cloud Security Alliance (CSA) and IEEE are joining forces to ensure that best practices and standards are developed and available to provide security assurance for cloud …
Get Backup: Free Mac backup software
Important aspects of your life are stored within the data on your computer, the loss of which can turn into a nightmare. To protect yourself from hard drive crash or human …
Fuzzing: Build security in
The greatest security challenge today is discovering new vulnerabilities. Software release cycles are getting faster and new technologies are increasingly complex, a perfect …
1Password coming to the iPad
1Password is the de facto choice for password safekeeping on the Mac. While there’s an iPhone application that complements the desktop version, the makers of this tool …
Spybot.AKB worm spreads across P2P networks and e-mail
PandaLabs detected a new worm, Spybot.AKB, which spreads using P2P programs (copying itself to the usual shared folders with different names) and also via e-mail. What’s …
Massive ZeuS compromise discovered
NetWitness analysts have discovered a dangerous new ZeuS botnet affecting 75,000 systems in 2,500 organizations around the world. The newly-discovered infestation, dubbed the …
Policing your IT police: Proactive security
When the global economy is in slowdown, there’s one sector that remains buoyant: crime. Illegal and illicit activities invariably rise as legitimate business falls, so …
Man gets 309 years in prison for identity theft
Robert Thompson, the leader of a massive identity theft and bribery scheme, was sentenced to 309 years in prison based on charges of conspiracy, wire fraud, mail fraud, bank …
Featured news
Resources
Don't miss
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
- Why logs aren’t enough: Enhancing SIEM with AI-driven NDR
- Aim for crypto-agility, prepare for the long haul