Help Net Security
NSA Secure Workstation Solution to use VMware
VMware announced an agreement with General Dynamics C4 Systems, a business unit of General Dynamics, to develop a complete turn-key High-Assurance Platform workstation using …
Best practices to combat SME security threats
SMEs face a different set of security challenges than enterprises and must adapt security policies and practices accordingly to avoid costly intrusions and that can cripple or …
Is PDF spam simply not working for the spammers?
Sophos has reported a dramatic decrease in the amount of spam emails using PDF file attachments to spread their unwanted messages. According to research compiled by …
Up to 59% of companies with active malware on their networks
Some 59% of companies that scanned between 20 and 30,000 PCs with Malware Radar had active malware on their computers, according to Panda Security’s Malware Radar, an …
Security Economics
Information security has finally become mainstream. It is almost a recognized profession, with its own areas of specialization: network security, audit, incident response, …
Symantec releases Norton Internet Security 2008, Norton AntiVirus 2008
Symantec launched Norton Internet Security 2008 and Norton AntiVirus 2008, industry leading security solutions that have been enhanced to provide computer users with …
5 Security Widgets for the Opera Browser
Widgets are Web programs you can run right on your desktop using Opera 9. This article introduces security-related widgets that will enhance your Opera experience. …
Intel vPro processor technology fortifies security
Intel further reinforced desktop PC security by unveiling the newest generation of Intel vPro processor technology for businesses and IT with new innovations that add better …
A closer look at Cryptainer LE: your own secure hidden data vaults
This tool enables you to secure your data and ensure that you are doing the best for your privacy. Cryptainer LE uses 256 bit AES encryption and works by creating multiple 25 …
Video: User Account Control in Windows Vista
Jason Fossen, an instructor at the SANS Institute, discusses the controversial User Account Control in Windows Vista.
Price list: trojans, password stealers, spam servers
Just over a thousand dollars can buy a cyber-crook the tools needed to turn malicious action into financial profit, according to data from PandaLabs. This is thanks to a black …
The state of data security in North America
RSA announced the results of a survey commissioned by RSA entitled “The State of Data Security in North America.” Conducted by Forrester Consulting, the survey …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)