Help Net Security
Top threats and security trends for 2008
Security experts at AVG published their analysis of 2007’s top viruses, Internet hacks and exploits, and reveal their forecast for the top security threats facing …
Looking back at 2007’s top viruses
Viruses made up some 15 percent of the threat landscape in 2007. According to AVG global security strategist Larry Bridwell, the 10 viruses exhibiting the most staying power …
NetSecurity opens state-of-the-art computer forensics lab
NetSecurity Corporation announced the launch of NetSecurity Forensic Labs, a state-of-the-art secure facility offering computer forensics investigation, electronic discovery, …
Test the security of your PC with F-Secure’s online Health Check
F-Secure Health Check enables Internet users to perform a comprehensive over-the-web check on the overall security status of their PC, including the operating system, web …
Free version of BinarySEC web application firewall
BinarySEC is a web application software firewall, that learns legitimate traffic of any website or web application running on Apache and blocks suspicious traffic. BinarySEC …
Year-end email threats trend report
Commtouch just released its 2007 Q4 Email Threats Trend Report, based on the automated analysis of billions of email messages weekly. The report examines recent trends in …
Networking with Microsoft Windows Vista
Although Windows Vista is not being adopted as fast as Windows XP was back in the day, this operating system is undoubtedly gaining ground and being introduced into places …
Yahoo! Mail rolls out new spam defense system
Yahoo! is tightening up their spam controls with a significant new defense system. They are now rejecting e-mail coming from zombie computers and identifying them with …
Fresh from CES – Firestick Pico ultra-portable security USB device
Yoggie Security Systems has introduced a unique, ultra-portable USB key-sized hardware-based firewall solution to protect PCs from malicious attacks. The Firestick Pico places …
New book: “Linux Networking Cookbook”
The recipes in her book focus on connectivity: firewalls, wireless access points, secure remote administration, remote helpdesk, remote access for users, Virtual Private …
Fresh from CES – Maxtor BlackArmor hardware encrypted storage solution
At CES, Seagate Technology introduced Maxtor BlackArmor encrypting storage solution that provides AES government-grade encryption protection against unauthorized access to …
WiFi Epidemiology: Can Your Neighbors’ Router Make Yours Sick?
In densely populated urban areas WiFi routers form a tightly interconnected proximity network that can be exploited as a substrate for the spreading of malware able to launch …
Featured news
Resources
Don't miss
- A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn
- Why your security strategy is failing before it even starts
- Protecting mobile privacy in real time with predictive adversarial defense
- Los Alamos researchers warn AI may upend national security
- Fake spam filter alerts are hitting inboxes