Help Net Security
Rogue software details: Data Protection
Data Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Data …
Rootkit-based Skype worm opens backdoors
While both Yahoo! Messenger and MSN Messenger have been massively exploited by IM worms, Skype users have been less exposed to this type of e-threat. It’s true that …
Microsoft delivers two critical updates
In today’s Patch Tuesday, Microsoft delivers two security bulletins that address vulnerabilities affecting Windows, Office and Visual Basic for Applications. …
Lessons learned and ongoing risks at third anniversary of T.J. Maxx breach
As the third anniversary of the infamous TJX data breach approaches, Slavik Markovich, CTO of Sentrigo, shares his thoughts on how data security has improved, and also …
Anti-Phishing Phyllis training game
Wombat Security Technologies announced the release of Anti-Phishing Phyllis, a training game to teach employees and customers how to spot fraudulent emails. In this training …
Xplico: Network forensic analysis tool
Xplico is an open source Network Forensic Analysis Tool. Its goal is to extract from an Internet traffic capture the applications data contained. From a pcap file Xplico …
New model for cloud-based security from Verizon Business
Verizon Business unveiled a new global, cloud-based SaaS portfolio that offers enterprises the ability to add security services and avoid purchasing expensive equipment. …
Schedule and modify tasks for Windows servers and workstations
Task Scheduler Pro from Lieberman Software now supports all major platforms in the Windows enterprise including Windows 7, Windows Server 2008 R2, Windows Server 2008 and …
Cloud scale data protection and security
ParaScale Cloud Storage 2.5, a cloud storage platform with features for cloud scale data security, protection and accessibility. The software includes features to efficiently …
Windows 7 Compatibility Checker turns out to be a Trojan
A deceptive “help” message invites recipients to check their PCs’ compatibility with Windows 7 by downloading and running an altered version of the Windows 7 …
Patch time: Keeping your system and programs up-to-date
For all computer users, patching is an important aspect of keeping secure online. Need more information on exactly what patching is, why it’s so important, and how to …
U.S. federal data security vulnerabilities
Data security vulnerabilities that exist within U.S. Federal agencies due to employees’ use of unsecure methods to exchange information, such as FTP – despite the …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems