Help Net Security
Microsoft patches 11 vulnerabilities
Microsoft released nine security bulletins which include four critical and five important updates to address 11 vulnerabilities affecting Windows, Internet Information …
Growing dangers of digital music and movies
A growing number of cyber threats are associated with the popularity of online music and videos, according to a McAfee report. Researchers found that adding the word …
Debunking the email privacy myth
Email communications are inherently risky, and information transmitted by email, including sensitive data and business-critical transactions, is more vulnerable than most …
Remote monitoring software for BlackBerry
SpectorSoft released eBlaster Mobile, remote monitoring and surveillance software. eBlaster Mobile allows you to remotely monitor the activity of anyone using a BlackBerry …
Samba 3.5.5 security release
Samba is the standard Windows interoperability suite of programs for Linux and Unix. Samba 3.5.5 is a security release in order to address CVE-2010-3069. All Samba versions …
Variable speed encryption appliances
CipherOptics a new line of Variable Speed Encryption (VSE) appliances. While traditional encryption appliances are based on a static throughput, the new VSE line of network …
Global botnet offering DDoS services
Damballa discovered a botnet that offers pay-for-delivery DDoS attacks. The IMDDOS botnet, named after the commercial name on the botnet website, has grown to be one of the …
ESET Cybersecurity for Mac
ESET Cybersecurity for Mac is a new security solution that delivers protection against internet security threats without impacting system performance. Users get both Internet …
Cloud computing trust-based security
Trusted Computing Group, which develops industry standards for hardware-based security rooted in trust, announced an effort to extend the concept of trust to cloud-based …
“Here you have” virus authors may be based in Spain
The “Here you have” virus, which first appeared about a month ago, is a worm that has spread widely via email using social engineering (the name of the virus stems …
New data security software from IBM
Today, organizations are struggling to manage a variety of complex data security threats, from misuse by insiders or cyber criminals outside the company. Combined with an …
How CIOs can get things done with their reduced staff
It seems to me that we’re seeing more and more news of late about the lackluster job outlook. Unemployment will continue to be higher than originally forecasted and …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)