Help Net Security
Red Condor 7 supports TLS encryption
Red Condor released version 7.0 of its anti-spam software, which powers the company’s family of Message Assurance Gateway email security appliances and its hosted spam …
Aggressive phishing campaign spoofing Microsoft Office Outlook Web Access
An aggressive spear phishing email campaign inviting recipients to “apply a new set of settings” to their mailboxes because of a recent “security …
Rogue software details: QuickHealCleaner
QuickHealCleaner is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Ubuntu Privacy Remix 9.04r3 released
Ubuntu Privacy Remix is a modified Live-CD based on Ubuntu Linux. UPR is not intended for permanent installation on hard disk. The goal of Ubuntu Privacy Remix is to provide …
A closer look at CA Internet Security Suite Plus 2010
CA ISS Plus 2010 provides protection against viruses, spyware, hackers, spam, phishing and offensive websites (with Parental Controls). There is also a backup option …
Netgear releases 3G/4G/WiMAX wireless routers
Netgear announced two full-featured new routers for connecting to 3G/4G/WiMAX cellular networks. The 3G/4G Mobile Broadband Wireless-N Router (MBRN3000) combines 802.11n …
Online fraud: Avoiding the seven deadly sins
By using the points below, companies transacting online can reduce the threat of fraudulent purchases or unauthorized account access and ensure a safer experience for their …
New books: The Sustainable Network, iPhone SDK Development, VMware Cookbook
What technologies do we need to solve the complex environmental, economic, social, and political challenges facing us today? This book by Sarah Sorenson reveals that one tool …
Cyber-liability: Importance and complexity
When the U.S. Supreme Court agreed to take the case of a California police officer who sent sexually explicit text messages on a department-issued pager, news reports …
Mac video surveillance
SecuritySpy is a multi-camera video surveillance application for the Mac. It will enable you to set up a comprehensive surveillance system quickly. The motion detection …
How to prevent identity theft
Identity thieves use low-tech methods (stealing your wallet or even eavesdropping at key moments) as well as sophisticated Internet scams to rob people of their sensitive …
Rogue software details: XPPoliceAntivirus
XPPoliceAntivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\XP …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform