Help Net Security
Adobe Flash Player remote code execution vulnerability roundup – update #2
Adobe Flash Player contains an code execution vulnerability. An attacker may be able to trigger this overflow by convincing a user to open a specially crafted SWF file. The …
HNS Book giveaway: “The Future of Reputation: Gossip, Rumor, and Privacy on the Internet”
June 05 2008: The winner is Jeffry B. ———————————- We are giving one of our readers a copy of “The …
Insider threats keep IT directors awake at night
Secure Computing announced the results of an IT Director survey that uncovers a rising concern of insider threats and widespread acknowledgement of being unprepared for …
Preparations for secure collaboration in a de-perimeterized business world
Jericho Forum released the results of a spot survey of 22 IT security vendors that responded to questions about vendor preparedness to deliver security for today’s …
Full disk encryption for the Mac platform
Check Point announced the release of Check Point Full Disk Encryption for Mac OS X, the industry’s first full-disk encryption solution with pre-boot authentication to …
The Botnet Business
Botnets have been in existence for about 10 years; experts have been warning the public about the threat posed by botnets for more or less the same period. Nevertheless, the …
When it comes to data breaches business owners have false sense of security
A recent national survey of more than 1,500 business leaders conducted by Zogby International on behalf of Identity Theft 911 found that business decision makers possess an …
SonicWALL updates its SSL VPN appliances
SonicWALL released flexible new enhancements to its SSL VPN product line, making it even easier for small to mid-size businesses to use and manage their secure remote access …
Centralized management with intuitive graphical monitoring
Stonesoft introduced StoneGate Management Center 4.3 for advanced centralized management which offers a fully customizable, graphical monitoring portal, an executive summary …
Internet-enabled live streaming solution for crisis management
ICOP announced the commercial launch of ICOP LIVE, a wireless, audio and video streaming solution designed to provide real-time situational awareness to first responders, …
SSH Tectia Server 6.0 for IBM z/OS has been released
SSH announced the general availability of SSH Tectia Server 6.0 for IBM z/OS. SSH Tectia Server for IBM z/OS is an advanced, cost-effective, secure file transfer solution for …
Safeguarding Your Data With TrueCrypt
There are countless reasons why you’d like to make sure your data stays private. Maybe you travel a lot and you’re worried your laptop may be stolen, perhaps you …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!