Hackers: Heroes of the Computer Revolution
This 25th anniversary edition of Steven Levy’s classic book traces the exploits of the computer revolution’s original hackers—those brilliant and eccentric nerds …
The top benefits of virtualization
According to a CDW-G report, 77 percent of agencies are implementing at least one form of virtualization, and of those, 89 percent are benefiting from the technology. Benefits …
Win a copy of “Cyber War” or “Hacking: The Next Generation”
Subscribe to the Help Net Security newsletter and win one of these books: If you win, we will e-mail you on July 19. Our weekly newsletter is packed with information security …
Metasploit training program launched
Rapid7 and SANS will provide comprehensive training to the growing global community of Metasploit Framework users. The Metasploit Framework is an open source project managed …
SSL Labs 1.0.63 comes with improvements
The latest revision of the SSL Labs assessment engine adds several improvements in the area of certificate chains. The engine will now try to download missing intermediate …
Prevent web application abuse
Mykonos Software announced a new release of the Mykonos Security Appliance, aimed at preventing Web application abuse. Targeted at organizations with significant web …
Fake eBay “payment request” e-mails lead to malware
E-mails purporting to contain a payment request from eBay are hitting inboxes around the world: The message contains no text – just an attached .html file. If the file …
Rogue software details: AV Security Suite
AV Security Suite is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Imperva mitigates insider threats
Imperva announced a File Security product line. SecureSphere File Firewall prevents unauthorized access to unstructured data residing on file servers, network attached storage …
Microsoft closes five vulnerabilities in Windows and Office
In today’s Patch Tuesday, Microsoft delivers four bulletins that close five vulnerabilities in Windows and Office. Wolfgang Kandek, Qualys CTO, comments: …
Latest ZeuS version comes in two flavors
There is a new version of ZeuS/Zbot bot out there. While previous versions were designed to indiscriminately target financial institutions around the world, this one …
Cybercriminals increase effectiveness with multi-stage attacks
Cybercriminals have been increasing the effectiveness of their individual outreach by creating multi-stage, also known as blended, attacks, which combine messaging and Web …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)