Help Net Security
Spyware rose 10% in Q1 2009
According to the PandaLabs malware report for the first quarter of 2009, Trojans have accounted for 73% of all new malware created during this period. Nevertheless, one of the …
Economic crisis increases Americans’ fears about fraud and ID theft
According to research conducted in late February by Unisys, the vast majority of Americans (nearly 75 percent) believe that the current world financial crisis has increased …
Fortify Software delivers governance to software security
Fortify announced the latest release of its software security suite, Fortify 360, as well as its first-ever hosted software security solution, Fortify Vendor Security …
Unbrowse SNMP reaches version 1.5.1
Unbrowse is a handy tool if you are working with the SNMP (Simple Network Management Protocol). In addition to a powerful MIB compiler, and browser – it also features …
Survey shows teens would spy on people online for money
A survey by Trend Micro suggests that British teens might be tempted by illegal online methods to make money. One in three teens (aged 12 – 18) admitted they would …
Data leakage prevention: From target to integration
The specifics of Data Loss Prevention projects are such that besides improving company’s data system infrastructure and choosing the technical solution it is necessary …
Integrate smart cards and biometrics for Windows
Gemalto introduced an innovative solution which enables organizations to enhance network security and protect online identities by replacing weak, static passwords with strong …
New book: “Advanced Software Testing, Vol. 2”
Advanced Software Testing, Vol. 2 teaches test managers what they need to know to achieve advanced skills in test estimation, test planning, test monitoring, and test control. …
New HP ProLiant G6 server line
HP introduced the new HP ProLiant G6 server line, which delivers double the performance of previous generations. The HP ProLiant G6 line’s advances in energy efficiency, …
Microsoft releases Windows Server 2008 Foundation
Microsoft today released Windows Server 2008 Foundation. Built for small businesses with 15 or fewer users, it can be used with single or multiple workloads, such as file …
Video: Dissecting the Conficker worm
Wolfgang Kandek, CTO of Qualys, talks about the Conficker worm. A Conficker removal tool is available for download here.
How to exploit the SIP Digest Leak vulnerability
The SIP Digest Leak is a vulnerability that affects a large number of SIP Phones, including both hardware and software IP Phones as well as phone adapters (VoIP to analogue). …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?