Help Net Security
2000% rise in NDR spam
In August 2009, PandaLabs recorded a 2000 percent increase in the amount of different NDR spam messages in circulation (compared to the number of samples detected between …
Symark acquires BeyondTrust and adopts company name
Symark announced the acquisition of BeyondTrust. The combined organization will operate under the name BeyondTrust, which reflects the company’s mission to provide a …
New SanDisk Flash memory cards for pros
SanDisk introduced a new line of SanDisk Extreme Pro CompactFlash memory cards designed for professional photographers. They feature a new SanDisk Power Core Controller, an …
New ETSI standard for EU-compliant electronic signatures
ETSI has published a multi-part standard that will facilitate secure paperless business transactions throughout Europe, in conformance with European legislation. The standard …
IEEE approves 10G-EPON standard
The IEEE Standards Board has announced the approval of an amendment to the popular IEEE 802.3 Ethernet standard. The Ethernet standard already covers 1 Gb/s Ethernet Passive …
Vulnerability scanner SAINT 7.1.2 released
SAINT offers an integration of vulnerability assessment and penetration testing tools. New vulnerability checks in version 7.1.2 JScript Scripting Engine Remote Code Execution …
DDoS monitoring service from VeriSign
VeriSign launched the VeriSign Internet Defense Network, a network and hardware agnostic DDoS monitoring, mitigation and attribution service that detects and filters malicious …
Research finds confidence in anti-virus solutions very low
CoreTrace announced the results of a revealing new survey that found most of the IT staff polled felt the threat from malware is on the rise and three quarters stated they are …
OMA DRM 1.0 Client for Android
Cloakware announced a new Open Mobile Alliance compliant Digital Rights Management solution for the secure delivery of digital content across the Android open source platform. …
SSH client MindTerm 3.3 released
MindTerm is a secure shell client that implements the SSH1 and SSH2 protocols. It is written in Java and is available as a stand-alone application and as a library component …
Web applications: Easy prey for hackers
Web applications are usually exposed on the Internet and offer an easier prey for attackers, who can develop tools that mimic legitimate users behavior in order to scan the …
International action day against mass-surveillance and mass-data retention
Saturday, 12th September, is scheduled to be an international action day against excessive surveillance: Freedom Not Fear 2009. In as many European capital cities as possible …
Featured news
Resources
Don't miss
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance
- Research shows identity document checks are missing key signals