Help Net Security
Spam stats for August: origins, categories and percentage
Worldwide Internet Mail Gateway Spam Percentage represents the number of messages that were processed and classified as spam versus the total number of messages processed when …
New Defiance Suite with enchanced mainframe data protection capabilities
Protegrity Corporation released Defiance Security Suite 4.5, the latest version of its award-winning data protection solution. The company broadens its mainframe data …
Partnership with Adobe for advanced electronic signature of documents
European electronic signature solutions provider Cryptolog has announced that it has signed a partnership agreement with Adobe to provide technology permitting the advanced …
Malware claims UK suffers nuclear explosion
Sophos has discovered a widespread spam campaign that claims that a powerful explosion occurred at a nuclear power station located in the suburbs of London on the afternoon of …
91% of organizations perceive cybercrime as a major business risk
Finjan announced the findings of its Web security survey of 1387 IT/Security professionals conducted during July 2008. The results reveal that an overwhelming number of …
Malware that creates fake YouTube pages for infecting users
PandaLabs has detected YTFakeCreator, a program used by cyber-crooks to create fake YouTube pages to infect users with malware. The infection method is as follows: …
Mac OS X privacy software gets an update
Mireth released a new 4.2 version of NetShred X, their easy to use internet track eraser that erases internet tracks, such as cache, history and email. NetShred X runs on Mac …
Briefing on the upcoming Smart Cards in Government Conference
The 7th Annual Smart Cards in Government Conference (October 22 – 24, 2008)will look at the industry challenged with meeting a new administration’s timetable and …
New book: “Programing .NET 3.5”
Programming .NET 3.5 offers a grand tour of the release, describing how the four principal technologies can be used together, with Ajax, to build modern n-tier and …
Disaster recovery for Windows Server 2008 Hyper-V
The need for virtual server protection is increasing as IT organisations consolidate workloads using virtualisation software. Further magnifying this need is market research …
Forensic watermarking and DRM/CAS technologies
Medialive launched a new SDK product range: m2mark, which features a highly secure approach to merging forensic watermarking and DRM/CAS technologies. The solution integrates …
Protect consumer credit card information
Passlogix announced today that its v-GO Access Accelerator Suite provides a comprehensive technology solution for compliance with Payment Card Industry Data Security Standard …
Featured news
Resources
Don't miss
- Meta open-sources AI tool to automatically classify sensitive documents
- Why SAP security updates are a struggle for large enterprises
- Attackers fake IT support calls to steal Salesforce data
- Google fixes Chrome zero-day with in-the-wild exploit (CVE-2025-5419)
- How to manage your cyber risk in a modern attack surface