Help Net Security
Discovery and Fuzzing for SQL injections with Web 2.0 Applications
Web 2.0 application assessment is becoming increasingly challenging due to their behavior and implementation of the components. It is imperative to identify hidden Web 2.0 …
Taking e-mail archiving to another level
A new version of GFI MailArchiver for Exchange, an email management and archiving solution, is being released today. GFI MailArchiver 6 integrates with Microsoft’s …
Industry’s first 65nm all-CMOS implementation
Staccato Communications announced the availability of the Ripcord2 family of single-chip, all-CMOS solutions targeted for WiMedia UWB and Wireless USB applications. …
Market’s first IEEE 1149.7 cJTAG semiconductor IP core
IPextreme announced the availability of the electronics industry’s first synthesizable IP core that implements the upcoming IEEE 1149.7 standard, which will be ratified …
Patch assessment and remediation of your complete virtual world
Shavlik Technologies announced the availability of Shavlik NetChk Protect 6.5. Shavlik NetChk Protect 6.5 is the industry’s first virtual machine management solution …
Combat rising risk in virtualized environments
BMC Software announced a comprehensive virtualization management approach, including nine new, integrated solutions specifically designed to help customers eliminate the …
Data leakage prevention for Windows
Applied Security launched fideAS 3.3, a data leakage prevention solution. Designed to protect and secure access to sensitive data on fileservers, desktops and laptops by …
ENISA publishes updated awareness guide
The European Network and Information Security Agency, i.e. the EU Agency ENISA’s Guide to best practices in Awareness Raising is one of the Agency’s most highly …
High-speed gigabit IP network equipment LSI
Oki has developed a low power consumption gigabit high-speed network processor, the “ML7240,” for the network equipment (i.e. Home/SOHO routers) market. ML7240 …
Rootkit Evolution
I saw my first rootkit in 2004, when I was still a rookie virus analyst. At that point I had some vague knowledge of UNIX-based rootkits. One day I stumbled on an executable …
Weekly malware report: keylogger, autorun worm and exchanger trojan
This week’s PandaLabs report looks at the Autorun.ADF worm, and the KeyLogger.E and Exchanger.AH Trojans. Autorun.ADF reaches computers in an attachment called “MY …
Browser privacy in Internet Explorer 8 Beta
With the new beta of Internet Explorer 8, Microsoft introduced InPrivate Browsing which helps prevent your browsing history, temporary Internet files, form data, cookies, and …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!