Help Net Security
EMC Avamar information disclosure weakness
EMC Avamar is a backup and recovery solution that utilizes data deduplication technology to identify redundant data at the source, minimizing backup data before it is sent …
PHP 5.3.6 fixes security issues
PHP 5.3.6 focuses on improving the stability of the PHP 5.3.x branch with over 60 bug fixes, some of which are security related. Security enhancements and fixes Enforce …
The crucial role of crypto technologies
Crypto technologies play a crucial role in data protection and compliance activities across a wide range of industry sectors, in both private and public organizations, …
5 tips to avoid Japan earthquake and tsunami scams
Unfortunately many cyber crooks are exploiting the tragedy in Japan to get money for unsuspecting surfers. Here are tips from Enigma Software to make sure you don’t …
Battling with manual firewall analysis
In a survey by Skybox Security, 42% of respondents had more than 100 firewalls to manage, and 67% said they have firewalls from multiple vendors. In fact, 54% said their firm …
GFI WebMonitor 2011 released
GFI Software launched GFI WebMonitor 2011, a web filtering and Internet monitoring software that helps to boost employee productivity by giving administrators the ability to …
73,000 malware strains created daily in 2011
The number of threats in circulation has risen in comparison to last year. In the first three months of 2011, PandaLabs identified an average of 73,000 new malware strains, …
Securing your network from malware
One of the most significant threats to the security of your network, and the leading cause of data loss, is malware. Whether that malware comes in the form of a worm probing …
The growth of cryptography
It’s not every day that Euclid appears in public with “Alice and Bob,” but in a lecture spanning a few thousand years, Ronald Rivest, a member of MIT’s …
IronBee versus ModSecurity
After spending a couple of weeks talking about IronBee to anyone willing to listen, I have assembled a list of commonly asked questions. Not unexpectedly, the question that …
LotusCMS multiple vulnerabilities
A weakness and multiple vulnerabilities have been discovered in LotusCMS, which can be exploited by malicious users to disclose sensitive information and compromise a …
How antivirus and antispyware help keep malware at bay
When it comes to creating Internet security threats, malware writers are masters of disguise and manipulation. They are constantly evolving their tactics to find new ways to …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems