Help Net Security
Continued growth of rogue antivirus activity
Sunbelt Software announced the top 10 most prevalent malware threats for the month of April 2010. The list of detections for April is little changed from March with the …
PortalProtect 2.0: Web threat protection, content-filtering and data loss prevention
Trend Micro PortalProtect 2.0 supports the Microsoft SharePoint 2010 platform and is backed by the Trend Micro Smart Protection Network infrastructure which scans, filters and …
Open source software for cloud services deployment
Cloud.com announced CloudStack, an open source software solution that accelerates the deployment, management and configuration of multi-tier and multi-tenant private and …
Detect and mitigate DNS security threats with ActiveTrust DNS
Internet Identity (IID) released ActiveTrust DNS, designed to detect, diagnose and mitigate DNS security threats. By hijacking DNS translations, attackers can drive …
SonicWALL SSL VPN 4.0 released
The SonicWALL SSL VPN 4.0 firmware release brings new features including a Web Application Firewall, Virtual Assist and simplified unified policy. Designed to enable …
Enhance applications with digital signing and encryption functions
EldoS released a new version of SecureBlackbox. New offerings such as secure operations with cloud storages and office document security will help developers create software …
Webroot adds vulnerability scanning to cloud-based web security service
Webroot introduced a vulnerability scanner delivered in the cloud as part of a Web security software-as-a-service (SaaS) model. The new service offers weekly and monthly tests …
Rogue software details: A-fast Antivirus
A-fast Antivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Sophos sells majority stake to equity group
Sophos has reached a definitive agreement to sell a majority interest in the company to equity group Apax Partners, in a transaction valuing the company at $830 million (USD). …
New book: “Windows 7: The Missing Manual”
Windows 7 comes without a single page of printed instructions. Fortunately, David Pogue is back, ready to serve as your clear, funny, expert guide with Windows 7: The Missing …
IT security priorities of future EU research
The European Network and Information Security Agency (ENISA) launched a new report concluding that the EU should focus its future IT security research on five areas. This …
Hyper-V Best Practices Analyzer for Windows Server 2008 R2 now available
In Windows management, best practices are guidelines to configure a server as defined by experts. For example, it is considered a best practice for most server technologies to …
Featured news
Resources
Don't miss
- Okta users under attack: Modern phishing kits are turbocharging vishing attacks
- One-time SMS links that never expire can expose personal data for years
- More employees get AI tools, fewer rely on them at work
- Energy sector orgs targeted with AiTM phishing campaign
- Exposed training apps are showing up in active cloud attacks