Help Net Security
Apple patches plenty of vulnerabilities in Mac OS X
Apple released Security Update 2010-002 which improves the security of Mac OS X. AppKit A buffer overflow exists in the spell checking feature used by Cocoa applications. …
Distributed test lab monitoring and network troubleshooting
Codenomicon launched a Network Analyzer that records test behavior and automatically visualizes network traffic. It provides testers with a clear picture of actual network …
90% of critical Windows 7 vulnerabilities are mitigated by eliminating admin rights
The removal of administrator rights from Windows users is a mitigating factor for 90% of critical Windows 7 vulnerabilities, according to research by BeyondTrust. The results …
Week in review: Mafia-like cyber crime syndicates, Pwn2Own contest and cloud computing risks
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Law firms are the new banks The new favorite targets of cyber …
Is it safe to file your taxes online?
Tax season. It’s not a favorite time of year for most people, but the deadline for filing income taxes for many countries is quickly approaching. And, especially in …
On the origin of spam
So you received another spam e-mail message. On the surface it seems rather ordinary. It’s an advertisement for a handful of brand-name prescription drugs. When viewed …
Rogue software details: Home Personal Antivirus
Home Personal Antivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Millions continue to click on spam
Even though over 80% of email users are aware of the existence of bots, tens of millions respond to spam in ways that could leave them vulnerable to a malware infection, …
First dual biometric reader
ZK Software ntroduced the world’s first dual biometric reader. Just the touch of a finger, a one second facial scan or flash of an ID card is all it takes for the iFace …
Checklist to accelerate your software security efforts
In recent years, Software-as-a-Service (SaaS) has emerged as a viable application delivery method, and most enterprises are now including some SaaS software in their …
Symantec web security monitoring against pervasive threats
Symantec announced Web Security Monitoring, a new managed security service which monitors organizations’ proxy and gateway security devices for connections from hosts …
Turning point for security decision making
According to IBM and The Ponemon Institute research, 77 percent of C-level executives report that their organization has experienced a data breach at some point, while all …
Featured news
Resources
Don't miss
- Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
- Microsoft blocks risky file previews in Windows File Explorer
- Building trust in AI: How to keep humans in control of cybersecurity
- Researchers expose large-scale YouTube malware distribution network
- Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)