Help Net Security
Create Password Protected PDF Files On Your Mac
In the office I often use different word processors and text writing software applications. The majority of my output files are generated by the nifty (especially for a long …
Designing IS strategies to stay ahead of network threats
Headline-grabbing news about computer security breaches and their devastating consequences on an agency and its constituents is the stuff of every CSO’s nightmare, …
Hackers insert footage of nuclear explosion into webcam
Czech hackers managed to get access to a webcam and insert realistic footage of nuclear explosion. The incident was broadcasted on the Czech TV programme Panorama on Sunday. …
The Exploit Development Process
Alexander Sotirov is a Vulnerability Researcher at Determina Inc. In this video, made at Black Hat Europe, he discusses on a general note how exploit writers develop exploits.
Reactions to the HP acquisition of SPI Dynamics
Here are a couple of quotes found while traversing today’s media releases regarding the HP’s acquisition of SPI Dynamics. Microsoft to follow? “This is the …
Break a security product beta and win prizes
BitDefender is inviting the public to test BitDefender Total Security 2008, the flagship product of the company’s upcoming family of Internet security products. Among …
Internet security forecast revisited
McAfee just revisited its top ten predictions for security threats in 2007. Their research shows that threats including data-thieving phishing Web sites are on the rise, as …
Capabilities and weaknesses of token-based authentication
From Martin McKeay’s blog: As most security professionals know, passwords are a losing proposition. We use them because the capability comes with your operating system, …
HP to acquire web application security expert
HP today announced that it has signed a definitive agreement to acquire SPI Dynamics, Inc., a provider of web application security assessment software and services, to further …
Business model based on the malicious MPack tool
PandaLabs has discovered the new 0.90 version of the malicious tool Mpack, available for US$1000 on the Web. This application could be defined as “a kit for installing …
Lock Down Your Mac with DoorStop X
When it comes to security, Mac OS X has proved on numerous occasions that it is quite safe, right out of the box. However, that doesn’t mean it cannot use additional …
A closer look at Tor privacy tool
Tor is a tool that can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. This is a graphical …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)