Help Net Security
Rogue software details: Security Master AV
Security Master AV is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Virtualized mobile computing on a secure flash drive
Absolute Identification and Kanguru Solutions released their collaborative product, the RocIT Defender Elite; a secure, pocket-sized virtualized mobile computing platform …
Steady increase of generic malware
Sunbelt Software announced the top 10 most prevalent malware threats for the month of May 2010. Eight of the top 10 detections for May are reflecting the trend toward …
Panda Cloud Antivirus upgraded and expanded
Panda Cloud Antivirus has been upgraded and expanded. The upgrade of the Free Edition improves and extends the protection provided by the original free product, and the Pro …
HMRC breach recommendations being ignored
24 months since the publication of the Poynter report which was commissioned after the HMRC breach, and almost three years since the original misplaced discs came to light, …
zPOD puts your PC in your pocket
Zinstall announced zPOD, a privacy-enhanced mobile computing appliance which lets users instantly use their complete familiar environment on any available computer. zPOD …
What’s privacy got to do with it?
The news has been rife over the last few weeks with stories of privacy breaches by names we trust and use on daily basis. First it was Google. The corporation with the most …
Researchers develop malware to devise protection against it
Malware action – security reaction. In most cases, security researchers and professionals are bound to this vicious cycle, but there are some that have taken steps to …
IT pros are hacking their own enterprises to keep intruders out
A survey of IT security professionals has discovered that 83% consider commercial applications, the ones you buy off the shelf, to be riddled with code flaws and …
Popular websites distribute spyware-infected Mac software
Intego has discovered a spyware application that is installed by a number of freely distributed Mac applications and screen savers found on a variety of websites. This …
USB reader combines flash memory with contactless smart card technology
HID Global announced a portable, dongle-sized USB smart card reader that includes a removable MicroSD flash memory slot and reader for SIM-sized contactless smart cards. By …
To hack or not to hack MSN accounts
A mass mail invitation to a suspicious “do-it-yourself” account hacking session puts Windows Live Messenger users at risk. The e-mail marking the first step of …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware