Help Net Security
VeriSign transitions all new RapidSSL certificates to SHA-1 algorithm
VeriSign announced an immediate transition to the SHA-1 algorithm on new RapidSSL brand certificates. The transition to the SHA-1 algorithm came within a few hours of the …
Tales from the support crypt: infected DVD drives, antiviruses that blow fuses and more
Talking viruses, infected physical devices, lights that go out are some of the “problems” Panda Security’s tech support service has had to face. Many of them …
Security Trends of 2008 and Predictions for 2009
As a new year approaches we must prepare for new Internet security threats. Every year, new and innovative ways of attacking computer users emerge and continue to increase in …
Rogue antivirus applications related to Continental Flight 1404 and other current news
Webroot has detected a new string of rogue antivirus applications that use URLs related to Continental Flight 1404 and other current news to manipulate consumers into …
ESET launches Remote Administrator 3.0
ESET today unveiled ESET Remote Administrator 3.0, a solution that enables centralized administration of dispersed ESET desktop and server software from one unified management …
Vulnerability in SQL Server could allow remote code execution
Microsoft is investigating new public reports of a vulnerability that could allow remote code execution on systems with supported editions of Microsoft SQL Server 2000, …
Check Point to acquire Nokia’s security appliance business
Check Point has signed an agreement to acquire Nokia’s security appliance business. The two businesses have collaborated over the past decade to deliver industry-leading …
Zero-day Web malware blocks surpass yearly average
In its monthly Global Threat Report issued today, ScanSafe, the pioneer and leading provider of SaaS Web Security, reported that the rate of zero-day malware blocks increased …
Linux-Based virtual desktop from IBM and co.
IBM, Virtual Bridges and Canonical announced general availability of a Linux-desktop solution designed to drive significant savings compared with Microsoft-desktop software by …
New password-stealing application disguised as a Firefox plugin
BitDefender Labs detected a new type of password-stealing application disguised as a Mozilla Firefox Plugin. The e-threat, Trojan.PWS.ChromeInject.A, is downloaded to a …
Low power unmanaged switches from Allied Telesis
Allied Telesis announced the low-power versions of the AT-FS705LE and AT-FS708LE, two advanced 10/100TX low power unmanaged switched with 5 and 8 ports respectively. The …
The Rise and Rise of Rogue Security Software
Rogue security software is an application that appears to be beneficial from a security perspective but provides little or no security, generates erroneous alerts, or attempts …
Featured news
Resources
Don't miss
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform
- Connected homes: Is bystander privacy anyone’s responsibility?
- Google says 2026 will be the year AI supercharges cybercrime
- Cybercriminals exploit RMM tools to steal real-world cargo