Help Net Security
First tri-band WLAN module in SDIO card form factor
Silex Technology unveiled the SX-SDWAG, a wireless module that provides 802.11a/b/g capabilities in an SDIO card form factor. Designed for wireless local area network (WLAN) …
6 tips for preventing laptop theft or loss
Absolute Software, the leading provider of patented computer theft recovery offers some advice on how to avoid becoming the next data loss headline: 1. Visual deterrents …
Details on a major vulnerability affecting Yahoo! Mail
Cenzic today published an advisory regarding a vulnerability discovered in Yahoo! Mail. This Cross-Site Scripting vulnerability allows attackers to steal Yahoo! identities and …
Is China leaving the Internet’s back door open?
The majority of the Internet’s malware-infected websites are located on Chinese networks, finds a new report released today by StopBadware.org, the university-based …
MultiFactor SecureAuth for Cisco VPN access enables PCI compliance
MultiFactor announced the availability of SecureAuth 4.5 for Cisco VPN Authentication, a secure access solution addressing specific PCI compliance requirements for large …
Q&A: The DNSChanger Trojan
Christoph Alme is the Principal Engineer and Team Lead of anti-malware research at Secure Computing Corporation. He is the inventor of several patent-pending key technologies …
APSolute Immunity provides networks with ability to fight emerging threats
Radware introduced its APSolute Immunity security initiative, a new strategic approach that maintains business continuity by protecting the applications infrastructure against …
More malicious attacks on the Threat Horizon
The Information Security Forum (ISF) is warning of an increase in malicious threats including attacks from organised crime and industrial espionage, along with a rise in …
Malware growth at a higher level than ever before
In its 2008 first half data security summary, F-Secure reports malware growth rate at a higher level than ever before. This recent explosion of malware doesn’t …
New book: “Your Brain: The Missing Manual”
Your Brain: The Missing Manual is a practical look at how to get the most out of your brain — not just how the brain works, but how you can use it more effectively. What …
Multiple vulnerabilities in Ruby
Multiple vulnerabilities in Ruby may lead to a denial of service (DoS) condition or allow execution of arbitrary code. With the following vulnerabilities, an attacker can lead …
Research pinpoints how institutions should respond to data breaches
Javelin Strategy & Research announced today results from a new study covering data breach victims, which highlights the acute awareness among consumers about data …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!