Help Net Security
Secure USB flash drives: Do you need one?
How many times have you used a USB flash drive at your offices? Hundreds? Thousands? Their sheer convenience makes usage almost second nature. But as often happens with IT …
International co-operation vital as malware sources disperse
Attackers are spreading their operational bases further around the world. During October, malware levels remained high, but threats originating from the …
Firefox 3.5.4 fixes critical security issues
Mozilla released Firefox 3.5.4 that fixes several security issues. Crashes with evidence of memory corruption Mozilla developers and community members identified and fixed …
Password strength checking with passwdqc
passwdqc is a simple password strength checking module for PAM-aware password changing programs, such as passwd(1). In addition to checking regular passwords, it offers …
Infrastructure fingerprinting via XSS
Yokoso! is an infrastructure fingerprinting system delivered via XSS attack. This project contains two different parts; the fingerprints and modules for the various browser …
Sourcefire iPhone application
A new free Sourcefire VRT iPhone application is available now from the App Store. This app features three real-time Sourcefire news feeds, including VRT Updates, VRT Top 10 …
New patent for encryption key generation method
The United States Patent and Trademark Office has granted Authernative a patent for an encryption key generation method. The newly issued US Patent No. 7,577,987 titled …
Carrier grade IPsec toolkit
SafeNet announced version 5 of QuickSec , a carrier grade IPsec toolkit that offers true multi-core support, integrated with Cavium Networks OCTEON Multi-core MIPS64 …
New book: “Mac OS X Snow Leopard: The Missing Manual”
For three consecutive years, one of the most popular computer books in the U.S. has been David Pogue’s Mac OS X: The Missing Manual. And now the beast is back. The new …
Amazon Relational Database Service enters public beta
The public beta of Amazon Relational Database Service (Amazon RDS), a new web service that makes it easy to set up, operate, and scale relational databases in the cloud. …
One-credential system for physical access control
CertiPath introduced architecture and operational systems for federated physical access control (PACS), leveraging high-assurance credentials. The concept demonstrates the …
Identify and classify malware samples with YARA
YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground