Help Net Security
Google has two times more malware than Bing, Yahoo! and Twitter combined
Barracuda released its Barracuda Labs 2010 Midyear Security Report, revealing data from two key areas: search engine malware and Twitter use and crime rate. Searching for …
New assurance mark of software application security
Veracode unveiled the VERAFIED High Assurance mark of software application security for the CWE/SANS Top 25 Most Dangerous Software Errors. This industry “seal of …
Sourcefire’s open source framework for deep threat inspection
Sourcefire announced Razorback, an open source framework designed to deliver deep inspection capabilities for combating today’s most complex threats. Developed to help …
Critical ToolTalk Database Server Parser vulnerability discovered
Check Point announced that its IPS Research team has recently discovered a critical vulnerability in a function of the ToolTalk Database Server Parser that can enable a remote …
The cost of cyber crime
ArcSight and the Ponemon Institute announced the results of the First Annual Cost of Cyber Crime Study (registration required). Over a four-week period, the 45 organizations …
Secure cell phone conference calling
Cellcrypt announced that it has launched a secure conference service that provides both device authentication and voice call encryption to participants using popular cell …
Exploitability data from real-time feeds
Qualys announced that QualysGuard Vulnerability Management now includes correlated exploitability information from real-time feeds to provide customers with up-to-date …
P2P increasingly favored by malware attackers
Cisco released its 2Q10 Global Threat Report, which is an aggregation of data and insights on threats from Cisco Security Intelligence Operations. The report merges the most …
PC surveillance software for Terminal Servers
Refog announces the release of Refog Terminal Monitor, a centralized software-based employee tracking system for the Terminal Server allowing administrators to track employee …
The impact of structural vulnerabilities on enterprise websites
Dasient released a new research report, “Structural Vulnerabilities on Websites: Why Enterprise Websites Are Vulnerable to Malware Attacks,” which found that, …
Free tool to protect against Windows “.LNK” zero-day flaw
Sophos has released the Sophos Windows Shortcut Exploit Protection Tool, which protects against a vulnerability that allows malicious hackers to exploit a bug in the way that …
Managing your identity, secure access and online storage while protected by the cloud
Webroot announced Webroot Internet Security Complete, the company’s newest consumer offering that integrates cloud-based threat protection with identity management and …
Featured news
Resources
Don't miss
- Meta open-sources AI tool to automatically classify sensitive documents
- Why SAP security updates are a struggle for large enterprises
- Attackers fake IT support calls to steal Salesforce data
- Google fixes Chrome zero-day with in-the-wild exploit (CVE-2025-5419)
- How to manage your cyber risk in a modern attack surface