Help Net Security
Mismatch between IT security challenges and deployed solutions
The “CDW User-Proof IT Security Report,” a survey of business IT professionals, reveals a disparity between the most common IT security headaches and …
Sophos assists computer crime unit in a botnet master case
Sophos assisted the Metropolitan Police Computer Crime Unit in bringing a case against Robert Matthew Bentley. The hacker, of Panama City, Florida, who went by the alias …
Virtual worlds face malware reality check
Gaming industry is consistently stripped of its virtual assets as cyber-crooks continue to exploit gamers in pursuit of financial gain. Virtual worlds can provide an exciting …
Explaining non-delivery report type of spam
Research shows that up to 90% of emails received by companies are spam, and spammers have adopted a variety of methods to bypass spam filters used in anti-spam software. In …
PCI Compliance Explained
Learn about the Payment Card Industry Data Security Standard (PCI DSS), a security standard that includes requirements for security management, policies, procedures, network …
When it comes to data security breaches, the general public doesn’t need to know
When it comes to data security breaches, 78 percent of US IT decision-makers feel that companies do not need to inform the general public; this according to a recent survey by …
Best of Open Source Security Conference announced
Sourcefire announced the launch of the Best of Open Source Security (BOSS) Conference. Scheduled to run concurrently with Sourcefire’s annual customer summit, the BOSS …
Cross platform data security for Windows Vista, XP & Mac OS X
GT Security launched SecuriKey v3.0, providing full support for Windows Vista, Windows XP, Mac OS X Leopard and Mac OS X Tiger. Designed to keep mobile data safe, SecuriKey …
Free e-book: “Scared Safe: Life’s Little Identity Theft Prevention Handbook”
E-Book entitled “SCARED SAFE: Life’s Little Identity Theft Prevention Handbook” by Todd Feinman, is available for free download beginning today for anyone …
New solution for protecting wireless devices from data loss
Based on the successful Computrace desktop and laptop management solution from Absolute, new Computrace Mobile is the only solution on the market for the management of all …
Storm and the future of social engineering
In 2007, Storm burst onto the scene and spread rapidly. A new form of malware that propagated using a combination of email and websites, it proved extraordinarily …
Critical vulnerability in Citect’s SCADA software
Core Security Technologies issued an advisory disclosing a vulnerability that could severely impact organizations relying on Citect’s flagship industrial process control …
Featured news
Resources
Don't miss
- Webinar: Beyond the Quadrant: An Analyst’s Guide to Evaluating Email Security in 2026
- CISO Assistant: Open-source cybersecurity management and GRC
- Firmware scanning time, cost, and where teams run EMBA
- How AI image tools can be tricked into making political propaganda
- Product showcase: Orbot – Tor VPN for iOS