Help Net Security
Rogue software details: Your Protection
Your Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Your …
Data breaches cost Australian companies millions
Australian organizations experience costly data breaches with the average organizational cost of a data breach, including activities intended to prevent a loss of customer or …
First security cart for iPad
With the release of Apple’s iPad, schools and other organizations will be looking at e-readers in new and innovative ways. Datamation Systems introduced the first of a …
Security benchmarks for Windows 7 and Windows Server 2008
The Center for Internet Security (CIS) released its consensus security benchmarks for Windows 7 and Windows Server 2008. The free benchmarks provide prescriptive controls …
Secure communication with RetroShare
RetroShare is an open source cross-platform, private and secure decentralized communication platform. It allows you to securely chat and share files with your friends and …
(IN)SECURE Magazine issue 25 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 25 has been released today. Table of contents The …
First iPad cloud server application
Rackspace Cloud Pro is a free application for the iPad to enable users can turn on backups for a server, create new servers from backups, manage back-up scheduling, re-boot, …
U.S. infrastructure at risk from sophisticated cyber attacks
Nearly three-quarters of federal IT decision-makers who work in national defense and security departments or agencies say the possibility is “high” for a cyber …
Drobo FS: Data storage and protection
Data Robotics introduced Drobo FS which is designed for simple, expandable file sharing. By providing network file sharing capabilities along with automated data protection, …
Closing the last door
There’s always a risk of viruses lurking behind links on a website. Even well-known sites can contain dangerous links, especially those with a high level of public …
Generic and behavior-based threats increasing
Sunbelt Software announced the top 10 most prevalent malware threats for the month of March 2010. The list shows the continued prevalence of Trojan horse programs circulating …
Fighting Web flaws is futile
Do you ever find yourself driving down the road in an unfamiliar place and you get that gut feeling that you’re headed in the wrong direction? Well, I feel that’s …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems