Help Net Security
SandBox Analyzer for Linux and addition of file-format exploit support
Norman’s SandBox technology continues to lead the fight against malware, helping security experts more quickly and accurately mitigate security threats. As security …
Consumer alert: Beware of email scams tied to financial crisis
Goodmail Systems, creators of CertifiedEmail are advising consumers to be on the lookout for fraudulent email scams and “phishing” attacks related to the current …
New GFI MailEssentials with additional anti-spam engine
A new version of the leading anti-spam and anti-phishing software GFI MailEssentials has been released, GFI, an international developer of quality software at unbeatable …
New Xceedium GateKeeper 620 provides PCI self-certification benefits
New Xceedium GateKeeper 620 is a hardened appliance that provides a cost-effective way to meet audit and compliance requirements and securely and efficiently manage remote IT …
I got the breach letter blues, what do I do?
With all the data breaches being reported, you may be one of more than 30 million-plus people this year to receive a breach letter. Notification letters can be unnerving and …
Permanent disposal of magnetically recorded data
Fujitsu announced Mag EraSURE ME-P3 Version 2, Fujitsu’s latest secure degaussing solution for the permanent erasure of all magnetically recorded data on hard disk …
Hybrid video network surveillance recording servers
With the demand for IP-video network surveillance systems on the rise in the United States, Sony is enhancing its line of security solutions with the addition of three hybrid …
High security messaging appliance
Tresys Technology announces the availability of Tresys TurretGate, a Cross Domain Solution (CDS) that allows for the secure routing of Java Message System (JMS) messages …
Database security packs for Oracle and SQL Server
Vormetric introduced the Vormetric Database Security Packs, which deliver data security, key security and separation of duties for Oracle and Microsoft SQL Server database …
Cigital Java Security Rulepack for Fortify Source Code Analyzer
Cigital, Inc. announced the release of the Cigital Java Security Rulepack 1.0, a set of Java static analysis rules for the Fortify Source Code Analyzer. Cigital Java Security …
Comprehensive wireless rogue tracing and containment solution
The new AirMagnet Enterprise 8.1 allows users to trace and block rogue devices that are physically connected to an enterprise network faster and more reliably than any other …
Trojan horse masked as an iPhone game
Sophos warns of a malicious spam campaign which is distributing a Windows Trojan concealed as a game for the popular Apple iPhone.  Samples intercepted by SophosLabs carry …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)