Help Net Security
A checklist for guarding against cache poisoning attacks
When reviewing your network infrastructure, don’t forget about that most arcane of networking technologies, the Domain Name System. A compromise of your name servers …
Netsparker: Web application security scanner
Netsparker can crawl, attack and identify vulnerabilities in all custom web applications regardless of the platform and the technology it’s built on, just like an actual …
BSA: 41% of software on personal computers is pirated
Individuals are turning to P2P networks and auction sites in staggering numbers to acquire or transfer illegal software and in doing so are harming the economy whilst exposing …
Implications of increasing malicious spam
Recent data from the Symantec monthly spam report suggests that the percentage of spam containing malware has increased. In September 2009, an average of 1.3 percent of all …
Metasm: Assembler, disassembler, compiler, linker and debugger
Metasm is a cross-architecture assembler, disassembler, compiler, linker and debugger. It is written in pure Ruby, with no dependency. It has some advanced features such as …
Sensitive data discovery and masking solution
Dataguise announced an integrated solution for comprehensive sensitive data discovery and masking featuring dgdiscover 3.0 and dgmasker 3.0. It is designed to find structured …
Vulnerability scanner SAINT 7.1.3 released
SAINT offers an integration of vulnerability assessment and penetration testing tools. New features in version 7.1.3: Added support for ntlmv2 authentication. SAINTwriter: …
Qsan’s 10GbE iSCSI storage solutions for cloud computing
This October, Qsan will present the latest redundant 10GbE iSCSI storage solutions – 3160TG and EP-3164D-GAS3 which are integrated with Qsan’s P500H 10GbE iSCSI …
YouTube used for video spam
Kaspersky Lab’s Content Filtering Research group recorded a mass mailing that contained a link directing users to a video advert on YouTube. The mass mailing contained a …
U.S. should focus on the protection of critical networks against cyber attacks
Because it will be difficult to prevent cyber attacks on critical civilian and military computer networks by threatening to punish attackers, the United States must focus its …
FIPS-validated USB drives with AES 256-bit encryption
Lexar Media announced Lexar JumpDrive SAFE S3000 FIPS and JumpDrive SAFE S3000 USB flash drives. The FIPS 140-2, Level 3-validated, enterprise-class drives, co-developed with …
Sun releases new update to Solaris 10 operating system
Sun Microsystems announced the Solaris 10 10/09 Operating System. The Solaris 10 OS has been extended with new performance and power efficiency enhancements, more streamlined …
Featured news
Resources
Don't miss
- The long conversations that reveal how scammers work
- Metis: Open-source, AI-driven tool for deep security code review
- How to cut security tool sprawl without losing control
- Product showcase: Proton Pass, a password manager with identity protection
- Internet slowly recovers after far-reaching Cloudflare outage