Help Net Security
New Panda GateDefender perimeter protection appliances
Panda Security has launched the new 9000 series of the Panda GateDefender Performa range, a security appliance that offers maximum protection for the network perimeter, …
Q3 spam and malware trends statistics and analysis
Spam volume returned to record highs in Q3 with fairly steady monthly increases throughout the summer. The acquisition of innocent machines via email and Web-based infections …
iPhone password safe utility SplashID enhanced with new features
SplashData announced a major update to the version of its SplashID secure information manager for iPhone and iPod® touch. The new SplashID version 4.5 offers significantly …
New Comodo Internet Security suite
Comodo Security Solutions has released Comodo Internet Security (CIS), a complete antivirus and firewall security package free to all PC users. Among its many powerful …
Latest Microsoft vulnerability used to steal confidential data
PandaLabs has detected several malicious files that are exploiting the latest vulnerability announced by Microsoft (MS08-067) to infect users and steal confidential data …
Tips for safeguarding your personal assets
It’s only natural for people to be concerned about the safety of their financial assets. Here are a few valuable tips from TrustedID: Monitor your credit history …
Users want fingerprint security in their cell phones
According to a consumer survey, a vast majority of cell phone users (89%) use the device for text messaging and transmitting photos and files. In spite of the privacy of these …
Protection of private files with Folder Castle 4.0
MagneticSoft released Folder Castle 4.0, a major update of the security tool that protects computer files and folders from snoops and thieves. Folder Castle lets the user …
With encrypted Wi-Fi vulnerable everyone is risking their assets
The seventh annual Wireless Security Survey from RSA reveals the continued, dramatic growth of wireless networks in the world’s major financial centres. The survey of …
Unencrypted backup tapes endanger enterprise data protection
Despite high profile cases of unencrypted backup tapes going missing, more than a third of organizations still do not know if they will encrypt their backup tapes and half do …
Unified Threat Management: what’s next and why
A recent study by the Aberdeen Group suggests that on average, more than 120 new vulnerability disclosures are made each week, nearly 90% of which could be exploited remotely, …
Cybersecurity programs expected to remain strong under next administration
U.S. federal government identity and smart card programs have grown significantly under the Bush administration. But with the election less than two weeks away, one …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware