Help Net Security
Details on recent Microsoft vulnerabilities
Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Internet Explorer, Windows Media Player, Office, Office for Mac, XML Core Services, …
Malware Evolution: April – June 2007
The events that took place during the first six months of 2007 have shown us that the direction in which threats are evolving is from social engineering to the increased usage …
Security features of Microsoft Exchange Server 2007 Service Pack 1
Microsoft announced Exchange Server 2007 Service Pack 1 and opened a technology preview for the software. Exchange Server 2007 SP1 features enhancements such as support for …
Enterprise-class fingerprint authentication solution for SMB
DigitalPersona announced the availability of the DigitalPersona Pro SBS Edition. Targeted at companies of 75 users or less, DigitalPersona Pro SBS delivers fingerprint-enabled …
Facebook users share their info to potential ID thieves
Sophos is warning social networking users of the dangers of allowing strangers to gain access to their online profiles, following new research into the risks of identity and …
Working with the iStumbler Wireless Discovery Tool
iStumbler is the leading wireless discovery tool for Mac OS X. It provides plugins for finding AirPort networks, Bluetooth devices and Bonjour services. The application is …
Rising threat from PDF and ZIP spam, phishing on the increase again
Data collected by SonicWALL’s Smart Network database of over 1.3 million e-mail users shows ongoing growth in the volume of spam, virus and phishing attacks, increased …
Novell acquires endpoint security management company
Novell announced the expansion of its enterprise management services capabilities through the acquisition of Senforce Technologies, a leader in endpoint security management. …
Danger behind instant messaging applications
Instant messaging has become increasingly popular lately. Programs like MSN Messenger, Yahoo! Messenger, AIM, etc, are more and more used as a means of communication among …
Server with top-secret data stolen from Forensic Telecommunications Services
The Forensic Telecommunications Services (FTS) has confirmed the theft of a computer server containing thousands of top-secret mobile phone records and evidence from …
Hardware based login for Windows Vista
Teslain’s Rohos Logon Key v.2.4 converts any USB drive into an access key for Microsoft Windows Vista, installing the new hardware based credential provider. Rohos Logon …
Power analysis training program in support of proposed FIPS 140-3 Standard
Cryptography Research, Inc. announced the availability of test equipment and a training program on power analysis attacks for FIPS 140-3 validation laboratories and product …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems