Help Net Security
Rogue software details: Win Security 360
Win Security 360 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Win …
IT budgets in 2010 to be at 2005 levels
IT budgets will essentially be flat in 2010, increasing by a weighted global average of 1.3 percent in nominal terms, compared with 2009 levels where IT budgets declined 8.1 …
Secure computing on a USB flash drive
The new IronClad USB drive shrinks a laptop’s hard drive – including the entire operating system, software applications, and files – onto a secure flash …
Four information management roles IT departments need
Gartner has identified four information-management roles that IT departments need to establish and recruit from outside the IT team in a major trend that will affect both IT …
Identity theft in focus
The stories are all too familiar: Money siphoned from a checking account. Unfamiliar charges racked up on a credit card bill. Discovering a loan has been taken out under false …
Week in review: Google and Adobe hacked by China, threats 2.0 and rogue Android applications
Here’s an overview of some of last week’s most interesting news and articles: Pay by password Verotel announced Verotel QuickCharge – a new tool for Internet …
8,378 reasons for better banking security
Reports that the Suffolk County Bank – a subsidiary of Suffolk Bancorp, the US financial institution – had its banking servers hacked last November were met with …
Attackers exploiting unpatched vulnerability in Internet Explorer
Microsoft is investigating a report of a publicly exploited vulnerability in Internet Explorer. There are active attacks attempting to use this vulnerability against Internet …
Top 3 tips for virtual infrastructure protection
Flexible infrastructure If you already have a disaster recovery solution in place make sure that it is flexible enough to be used for physical and virtual server platforms. …
Mobile security market to exceed $4 billion by 2014
Strong enterprise demand for data security is driving rapid growth in mobile device management services. According to a study by ABI Research, the number of smartphones …
Top 10 information security threats for 2010
“The start of a new year is a great time for companies to evaluate their information security practices and begin thinking about what threats they’ll be facing in …
Continuing evolution of Internet threats
Spammers continue to be cutting-edge marketers, this time taking advantage of the reputations of global brands, such as UPS, DHL and Facebook, to prompt opening of emails. …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform