Help Net Security
The four myths of cyber security
Governments and corporations around the globe are facing a crisis in the form of cyber security threats. Incidents and exploits crafted by an effective and growing menace are …
OpenDNSSEC 1.0.0 released
Internet engineers continue to enhance Internet security with the release of OpenDNSSEC, a tool which simplifies the process of signing one or more zones with DNSSEC. …
Microsoft releases giant patch collection
In today’s Patch Tuesday, Microsoft delivers 13 bulletins that fix vulnerabilities targeting Windows and Office. Here’s a video of Qualys CTO Wolfgang Kandek and …
Unaware of the dangers, most teens share personal info online
50% of European teenagers give out personal information on the web – according to an EU study – which can remain online forever and can be seen by anybody. Today, …
Safety tips for online dating
BitDefender cautioned online daters about the increased security risks associated with looking for love online this year and their unique susceptibility to identity theft and …
Is authenticated XSS a problem?
Obviously, see cross-site scripting (XSS) is a big problem on the public Web. But there’s another angle to XSS that no one seems to be talking about – at least I …
Online shopping safety: Consumers hold retailers responsible
Almost a quarter (24%) of UK adults believe retailers are primarily responsible for making online shopping safer, according to a survey of 1004 consumers by CyberSource. This …
Seagate ships the Savvio 10K.4 hard drive
Seagate today announced its Savvio 10K.4 hard disk drive, the world’s highest-capacity 2.5-inch enterprise-class drive. Built for the demands of enterprise servers and …
Political hacktivism and the exploitation of tragedies is on the rise
A new McAfee report highlights the rise of political hacktivism in countries like Poland, Latvia, Denmark and Switzerland as well as the most significant spam-generating …
Multiple vulnerabilities in popular Web servers
When a file is created on a Windows system, a DOS-compatible 8.3 short file name (hereafter referred to as ‘8.3 alias’) is generated for backwards compatibility …
Automated malware analysis platform
HBGary released Responder Professional 2.0, a Windows physical memory and automated malware analysis platform that analyzes all programs in memory including malware to obtain …
Beyond the cloud: Common Assurance Metric
The Common Assurance Metric (CAM) launched today is a global initiative that aims to produce objective quantifiable metrics, to assure Information Security maturity in cloud, …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption