Help Net Security
Survey uncovers security policy lapses in UK business
Insight Consulting, the independent security consultancy of Siemens Enterprise Communications, today announced the findings and availability of new research on the attitudes …
Ruby on Rails security cheatsheet
Ruby on Rails is a free web application framework that aims to increase the speed and ease with which database-driven web sites can be created and offers skeleton code …
iPod touch is a handy Wi-Fi discovery tool
Richard Menta made a short video in which he shows how an iPod touch can be used to discover available wireless networks nearby. More about this at his website.
A closer look at ZoneAlarm ForceField
Check Point recently unveiled a public beta of the new ZoneAlarm ForceField, the first virtualised, on-demand browser security solution.  It works by enabling …
idBank – virtual secure identity credentials
HID Global announced the launch of the idBank System, a revolutionary vehicle for the delivery of virtual secure identity credentials. The idBank System enables the delivery …
First virtualised browser security solution
Check Point today unveiled a public beta of the new ZoneAlarm ForceField, the first virtualised, on-demand browser security solution.  ZoneAlarm ForceField Features and …
Four years in a chinese jail for gaming virus writer
Sophos writes that Chinese court has sentenced four men to jail for virus writing. The men were found to have been behind the Fujacks worm (also known as Worm.Whboy) which …
How to steal pictures with Google’s Picasa – XSS demo
From a blog post on xs-sniper.com: “We’ve posted a snippet of some of the research we’ve done on Cross Application Scripting and URI exploitation. It’s …
Hosting firm’s support database a target of malicious activity
Todd Abrams, the CEO of Layered Technologies released a statement in which he stated that the company’s support database was a target of malicious activity on the …
AIRRAID2 wireless hacking tournament
AIRRAID2 s a cutting-edge wireless and wired hacking tournament that challenges participants with WiFi and Bluetooth wireless hacking against an enterprise infrastructure …
Amazon-inc.com phishing e-mails
There is a new batch of Amazon phishing e-mails. The address linked inside the message goes to a random collection of quite possibily compromised computers and afterwards …
Quick start program for shielding vulnerabilities in Electronic Health Record systems
In response to recent findings of the eHealth Vulnerability Reporting Program (eHVRP) study (PDF) announced on Monday, Third Brigade, a security software company specializing …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act