Help Net Security
Encryption challenge worth $100K
News that am encrypted swiss army knife from manufacturers Victorinox remained uncracked – and a $100,000 prize went unclaimed – at the Consumer Electronics Show …
Nmap 5.20 released
Nmap is a free and open source utility for network exploration or security auditing. Nmap 5.20 offers more than 150 significant improvements: 30+ new Nmap Scripting Engine …
Analysis of 32 million breached passwords
Imperva released a study analyzing 32 million passwords exposed in the Rockyou.com breach. The data provides a unique glimpse into the way that users select passwords and an …
Mac OS X Snow Leopard common criteria certification
Atsec information security announced the successful common criteria certification of Mac OS X Snow Leopard at EAL 3 (augmented for flaw remediation) with the Controlled Access …
Critical Shockwave Player vulnerabilities patched
Critical vulnerabilities have been identified in Adobe Shockwave Player 11.5.2.602 and earlier versions, on the Windows and Macintosh operating systems. The vulnerabilities …
4,500 USBs left at dry cleaners
A survey reveals that in the last year, 4500 memory sticks have been forgotten in people’s pockets as they take their clothes to be washed at the local dry cleaners. …
FBI Director to chronicle the evolution of cyber threats at RSA Conference 2010
Robert Mueller, Director of the Federal Bureau of Investigation, will deliver a keynote address at RSA Conference 2010. Mueller’s keynote will detail cyber threats …
Rogue software details: ArmorDefender
ArmorDefender is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Three-factor authentication using voice biometrics
PhoneFactor announced biometric verification for its phone-based authentication platform. By leveraging an existing voice channel, the new offering simultaneously verifies …
Serious Mac OS X vulnerabilities patched
Apple released Security Update 2010-001 which improves the security of Mac OS X. CoreAudio A buffer overflow exists in the handling of mp4 audio files. Playing a maliciously …
81% of organizations lack visibility into network traffic
According to a new research report by Enterprise Management Associates, insufficient network monitoring coverage is a pervasive and growing problem among enterprises, …
Scammers aggressively targeting Haiti donations
A week after the devastating Haiti quake, scammers are working harder than ever to exploit the good will of people that want to help the victims by giving donations. The FBI …
Featured news
Resources
Don't miss
- Report: The State of Secrets Sprawl 2025
- APTs have been using zero-day Windows shortcut exploit for eight years (ZDI-CAN-25373)
- Moving beyond checkbox security for true resilience
- Dependency-Check: Open-source Software Composition Analysis (SCA) tool
- Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK