Help Net Security
Code signing certificates for Adobe AIR applications
VeriSign today released VeriSign Code Signing Certificates for an application on Adobe AIR. Adobe AIR is a cross-operating system runtime that enables rich Internet …
Deep packet inspection testing methodology videos and documentation
BreakingPoint Systems released a detailed test methodology and video series that enables network engineers to test the deep packet inspection (DPI) features of content-aware …
Internet Terrorist: Does Such A Thing Really Exist?
Recently, I have experienced an increase in organizations questioning how real is the threat of Internet terrorism and what they can do to protect themselves. As a former …
New version of SifoML e-mail gateway appliance
O2Security released the newest version of its email gateway appliance. SifoML v3.9 provides new features and enhancements, including the ability to prevent attacks on networks …
Summary of changes to next version of PCI Data Security Standard
The PCI Security Standards Council (PCI SSC) announced the summary of forthcoming changes to PCI DSS as it moves from version 1.1 to the previously announced version 1.2 in …
Personal data of 92,095 credit applicants exposed in a security breach
A computer server within InterActive Financial Marketing Group (IFMG), a division of Dominion Enterprises located in Richmond, Virginia, was hacked into and illegally accessed …
Symantec to acquire PC Tools
Symantec Corp. signed a definitive agreement to acquire PC Tools, a global provider of innovative software products designed to protect the privacy and security of Windows …
Reputation Attacks: A Little Known Internet Threat
Reputation attacks target both individuals and companies, and their goal is to ruin the victim’s reputation. While attack techniques are varied, the consequences are …
Detect and prevent data loss due to misdirected email
NextLabs released Enterprise DLP 3.5, the latest release of its host-based data loss prevention system that proactively applies identity-driven policy to prevent external data …
OTS Red Flag examination procedures
Now that the Office of Thrift Supervision (OTS) has unveiled its FACT Act Red Flags examination procedures, financial institutions are getting the first concrete look at what …
Protect applications within virtual environments
Check Point announced VPN-1 Virtual Edition (VE). Virtualization of multiple servers into a single appliance creates an entirely new type of environment that requires new ways …
McAfee completes acquisition of Reconnex
McAfee announced that it has completed the acquisition of Reconnex for $46 million in cash. Through the acquisition, McAfee further enhances its position in proactive security …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!