Help Net Security
Permanent Stakeholders’ Group of top security advisors appointed
As of today, a new composition of 30 top security experts start their term of office as members of the Permanent Stakeholders’ Group (PSG), giving advice to the …
Security updates for Adobe Reader and Acrobat
A critical vulnerability has been identified in Adobe Reader 9.3 for Windows, Macintosh and UNIX, Adobe Acrobat 9.3 for Windows and Macintosh, and Adobe Reader 8.2 and Acrobat …
Top 25 most dangerous programming errors
Based primarily on the CWE List and leveraging the SANS Top 20 attack vectors, the main goal of the Top 25 list is to stop vulnerabilities at the source by educating …
CORE IMPACT Pro integrates with Metasploit Project
Core Security Technologies has created a fully supported technical integration between CORE IMPACT Pro and the Metasploit open-source exploit framework. Through the …
Secure Internet browser: Comodo Dragon
Comodo released its new Internet browser, the free Comodo Dragon which is constructed on the open source Chromium Project browser. Dragon’s enhancements increase …
Tokenization: A new approach to enterprise data security
As enterprises seek to protect data from cybercriminals, internal theft or even accidental loss, encryption and key management have become increasingly important and proven …
BruCON 2010 call for papers
BruCON is a 2-day security and hacking conference held in Brussels (24 & 25 September 2010), full of interesting presentations, workshops and security challenges. Help …
Minimalist server monitoring
Anfibia Reactor is a web-based server monitoring solution that oversees the CPU, memory, battery, hard drives, makes sure network connections are working, checks databases, …
F-Secure protects Android users
F-Secure released Anti-theft for Mobile and Mobile Security, which includes the Browsing Protection feature, for smartphones on the Android platform. Today’s smartphones …
Rogue software details: Security Essentials 2010
Security Essentials 2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Week in review: Aurora malware, cyber war games and 0-day vulnerabilities for sale
Here’s an overview of some of last week’s most interesting news and articles: Biggest Chinese hacker training site taken down Black Hawk Safety Net, which offered …
Rogue software details: MalwarePro
MalwarePro is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)