Help Net Security
Week in review: Facebook privacy fail, malware analysis and banking Trojans
Here’s an overview of some of last week’s most interesting news, reviews and videos: Splunk.com password leak Splunk announced on their blog that they discovered …
Majority unaware of how sensitive data is stored online
The majority of U.S. citizens are unaware of how their online data is stored and who secures it, according to a Business Software Alliance (BSA) survey. Approximately one in …
Low confidence in virtual environment security
There’s a significant gap between the speed at which companies are willing to deploy virtualization and their security readiness to address the added complexity that any …
Ubuntu 10.04 released
Ubuntu 10.04 LTS includes three years of support through free security and maintenance updates. It features extensive design work, faster boot speed, social network …
Cisco Press books in the App Store
Cisco Press launched its first iPhone/iPad networking technology Apps, for IT professionals interested in general networking, networking security, or IP Video. The new Apps …
Secure document viewing
VASCO Data Security announced a solution for secure document viewing. By integrating VASCO authentication technology with LiveCycle Rights Management ES2, enterprises can now …
Red Condor 7.1 targets scams, phishing and image-based spam
Red Condor released version 7.1 of its anti-spam software which contains content filtering enhancements, a new grey listing feature, auditing controls, and enhanced …
Symantec acquires PGP
Symantec has signed definitive agreements to acquire PGP and GuardianEdge. Symantec will buy PGP for a purchase price of approximately $300 million in cash and GuardianEdge …
India now the primary producer of viruses
India has pushed Korea into second place and taken over the mantle of the world’s largest producer of internet viruses, according to analysis of internet threats in …
The staggering cost of a data breach
The average cost of a data breach globally stood at USD 3.43 million last year, the equivalent of USD 142 per compromised customer record, according to research from the …
Rogue software details: Digital Protection
Digital Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Introduction to malware analysis
In this video, Lenny Zeltser will introduce you to the process of reverse-engineering malicious software. He will outline behavioral and code analysis phases, to make this …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware