Help Net Security
Hacking Web 2.0 JavaScript: Reverse engineering, discovery and revelations
Today, applications are becoming increasingly dependent on the Internet as a foundation platform. As the application domain increases worldwide, the variety of web content …
Rogue software details: Your Protection
Your Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Your …
Data breaches cost Australian companies millions
Australian organizations experience costly data breaches with the average organizational cost of a data breach, including activities intended to prevent a loss of customer or …
First security cart for iPad
With the release of Apple’s iPad, schools and other organizations will be looking at e-readers in new and innovative ways. Datamation Systems introduced the first of a …
Security benchmarks for Windows 7 and Windows Server 2008
The Center for Internet Security (CIS) released its consensus security benchmarks for Windows 7 and Windows Server 2008. The free benchmarks provide prescriptive controls …
Secure communication with RetroShare
RetroShare is an open source cross-platform, private and secure decentralized communication platform. It allows you to securely chat and share files with your friends and …
(IN)SECURE Magazine issue 25 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 25 has been released today. Table of contents The …
First iPad cloud server application
Rackspace Cloud Pro is a free application for the iPad to enable users can turn on backups for a server, create new servers from backups, manage back-up scheduling, re-boot, …
U.S. infrastructure at risk from sophisticated cyber attacks
Nearly three-quarters of federal IT decision-makers who work in national defense and security departments or agencies say the possibility is “high” for a cyber …
Drobo FS: Data storage and protection
Data Robotics introduced Drobo FS which is designed for simple, expandable file sharing. By providing network file sharing capabilities along with automated data protection, …
Closing the last door
There’s always a risk of viruses lurking behind links on a website. Even well-known sites can contain dangerous links, especially those with a high level of public …
Generic and behavior-based threats increasing
Sunbelt Software announced the top 10 most prevalent malware threats for the month of March 2010. The list shows the continued prevalence of Trojan horse programs circulating …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)