Help Net Security
Top security technologies that stem data breaches
Securosis announced the findings of a comprehensive independent data security survey of more than 1100 multinational IT security practitioners. The survey focused on …
F-Secure Internet Security 2011 released
F-Secure Internet Security 2011 has been designed to be non-intrusive. This means the product only asks for the user’s attention when it’s really necessary. The …
Microsoft patches 11 vulnerabilities
Microsoft released nine security bulletins which include four critical and five important updates to address 11 vulnerabilities affecting Windows, Internet Information …
Growing dangers of digital music and movies
A growing number of cyber threats are associated with the popularity of online music and videos, according to a McAfee report. Researchers found that adding the word …
Debunking the email privacy myth
Email communications are inherently risky, and information transmitted by email, including sensitive data and business-critical transactions, is more vulnerable than most …
Remote monitoring software for BlackBerry
SpectorSoft released eBlaster Mobile, remote monitoring and surveillance software. eBlaster Mobile allows you to remotely monitor the activity of anyone using a BlackBerry …
Samba 3.5.5 security release
Samba is the standard Windows interoperability suite of programs for Linux and Unix. Samba 3.5.5 is a security release in order to address CVE-2010-3069. All Samba versions …
Variable speed encryption appliances
CipherOptics a new line of Variable Speed Encryption (VSE) appliances. While traditional encryption appliances are based on a static throughput, the new VSE line of network …
Global botnet offering DDoS services
Damballa discovered a botnet that offers pay-for-delivery DDoS attacks. The IMDDOS botnet, named after the commercial name on the botnet website, has grown to be one of the …
ESET Cybersecurity for Mac
ESET Cybersecurity for Mac is a new security solution that delivers protection against internet security threats without impacting system performance. Users get both Internet …
Cloud computing trust-based security
Trusted Computing Group, which develops industry standards for hardware-based security rooted in trust, announced an effort to extend the concept of trust to cloud-based …
“Here you have” virus authors may be based in Spain
The “Here you have” virus, which first appeared about a month ago, is a worm that has spread widely via email using social engineering (the name of the virus stems …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations