Help Net Security
Tales from the support crypt: infected DVD drives, antiviruses that blow fuses and more
Talking viruses, infected physical devices, lights that go out are some of the “problems” Panda Security’s tech support service has had to face. Many of them …
Security Trends of 2008 and Predictions for 2009
As a new year approaches we must prepare for new Internet security threats. Every year, new and innovative ways of attacking computer users emerge and continue to increase in …
Rogue antivirus applications related to Continental Flight 1404 and other current news
Webroot has detected a new string of rogue antivirus applications that use URLs related to Continental Flight 1404 and other current news to manipulate consumers into …
ESET launches Remote Administrator 3.0
ESET today unveiled ESET Remote Administrator 3.0, a solution that enables centralized administration of dispersed ESET desktop and server software from one unified management …
Vulnerability in SQL Server could allow remote code execution
Microsoft is investigating new public reports of a vulnerability that could allow remote code execution on systems with supported editions of Microsoft SQL Server 2000, …
Check Point to acquire Nokia’s security appliance business
Check Point has signed an agreement to acquire Nokia’s security appliance business. The two businesses have collaborated over the past decade to deliver industry-leading …
Zero-day Web malware blocks surpass yearly average
In its monthly Global Threat Report issued today, ScanSafe, the pioneer and leading provider of SaaS Web Security, reported that the rate of zero-day malware blocks increased …
Linux-Based virtual desktop from IBM and co.
IBM, Virtual Bridges and Canonical announced general availability of a Linux-desktop solution designed to drive significant savings compared with Microsoft-desktop software by …
New password-stealing application disguised as a Firefox plugin
BitDefender Labs detected a new type of password-stealing application disguised as a Mozilla Firefox Plugin. The e-threat, Trojan.PWS.ChromeInject.A, is downloaded to a …
Low power unmanaged switches from Allied Telesis
Allied Telesis announced the low-power versions of the AT-FS705LE and AT-FS708LE, two advanced 10/100TX low power unmanaged switched with 5 and 8 ports respectively. The …
The Rise and Rise of Rogue Security Software
Rogue security software is an application that appears to be beneficial from a security perspective but provides little or no security, generates erroneous alerts, or attempts …
Juniper positioned among the leaders of SSL VPN Magic Quadrant
Juniper Networks has been positioned in the “Leaders” quadrant of Gartner’s recently published Magic Quadrant for SSL VPNs.1  The report evaluates vendors …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems