Help Net Security
Video: Web application scanning with credentials using Nessus
Learn how to configure Nessus to use credentials and login into a web application to scan with CGI generic tests.
EU leaders agree on Internet access safeguards
A user’s Internet access may be restricted, if necessary and proportionate, only after a fair and impartial procedure including the user’s right to be heard. …
Which country has the most bot-infected computers?
According to data compiled during October by PandaLabs, Spain tops the bot ranking with 44.49% of all computers infected by bots. These programs, once they have infected a …
IT professionals don’t use Facebook for work
79 percent of IT professionals use social networking sites such as Facebook and YouTube, while the rest do not use social networking sites at all, according to a recent …
Largest security conference and hands-on training in India
Securitybyte and OWASP India are hosting India’s largest information security event in New Delhi at the Crowne Plaza Hotel on Nov 17th – Nov 20th 2009. The …
Ask the social engineer: Practice
One reader wrote in asking: “How can one practice social engineering before using it in the wild?” Answering is Chris “loganWHD” Hadnagy, the lead …
Embracing tokenization: Payment without pain
Today, it’s expected that merchants accept electronic payments. It’s more than expected that those payments are secure. No data leaks or breaches of any kind. The …
Discover security flaws in source code with Graudit
Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility grep. Graudit supports scanning code …
Find potential exploit conditions in Microsoft Office documents
OfficeCat is a command line utility developed by the Sourcefire VRT that can be used to process Microsoft Office Documents to determine the presence of potential exploit …
Trojans dominate BitDefender’s top 10 e-threats list
The top spot on BitDefender’s top 10 e-threats list for October is once again Trojan.Clicker.CM, which is mostly present on websites hosting illegal applications such as …
Top causes of identity fraud
Identity fraud increased substantially in 2008, reversing a four-year trend of decreasing incidents. Researchers say identity fraud increased by 22 percent last year and they …
Global security best practices
The latest Microsoft Security Intelligence Report shares security best practices from countries that have consistently exhibited low malware infection. These best practices …
Featured news
Resources
Don't miss
- A new approach to blockchain spam: Local reputation over global rules
- SAP zero-day wake-up call: Why ERP systems need a unified defense
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders