Reviews
  • Web application penetration testing with ImmuniWeb

    | by Berislav Kucan - Tuesday, 27 May 2014.

    Switzerland-based ethical hacking and penetration testing experts High-Tech Bridge recently released an interesting security product that uses a hybrid approach towards web application security testing.

    Based on years of experience, the new ImmuniWeb offering is a Software-as-a-Service tool that combines manual and automated penetration testing in a cost effective way.

  • Secure public WiFi with avast! SecureLine for iOS

    | by Mirko Zorz - Editor in Chief - Monday, 19 May 2014.

    While constant Internet connectivity can be useful, it does create many privacy and security issues whose existence remains a mystery for the majority of mobile users.

    If you connect to untrusted networks on a regular basis, and most users do, you should consider a VPN solution. It's a simple way to make your online experience on the move more private as well as secure.

  • Thecus N5550 NAS Server inside and out

    | by Mirko Zorz - Friday, 25 April 2014.

    Having a backup drive has become essential. Those serious about their storage needs turn to NAS devices. Like most tech available today, those range from introductory models with a modest set of features, to complex powerhouses with a myriad of options.

    What I'm taking a look at here is a fairly complex device whose feature list is anything but basic. The Thecus N5550 is a five-bay NAS powered by an Intel Atom Processor D2550 (1.86GHz Dual Core) and 2 GB of DDR3 RAM.

  • Professional Penetration Testing, Second Edition

    | by Zeljka Zorz - Monday, 7 April 2014.

    Are you interested in a career in penetration testing, and don't know where to start? Here is a book that gathers all the relevant information in one place, and gives a good overview of what the job entails and what skills are needed.

  • Network Security Through Data Analysis

    | by Zeljka Zorz - Thursday, 3 April 2014.

    One of the most crucial tasks of a network administrator is to keep the network secure - or as secure as possible. In order to do this, they must know of which components the network is made and how these components are used. In short, they have to have an accurate picture of the situation. This book explains how to reach that goal.




Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //