Help Net Security
Two-thirds of all email blocked based on sender reputation
St. Bernard Software’s LivePrism filtering solution blocked two-thirds of its customers’ incoming email in July based solely on sender reputation without having to …
PDF Spam: A Step Ahead of Image Spam
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the …
Spammed out “shocking photos” emails contain malicious payload
Sophos is urging computer users to think before opening unsolicited email attachments following the discovery of a widespread malicious spam campaign that claims to contain …
Poorly managed web encryption confusing consumers
Nearly half of consumers experiencing website security alerts ignore the alert and proceed to do business on the site, putting at risk their personal and financial data, …
List of ICSA Labs certified Virtual Private Network products
ICSA Labs has certified safeguards for four virtual private network products. The VPN products earning ICSA Labs Secure Sockets Layer-Transport Layer Security (SSL-TLS) VPN …
Guide to Online Antivirus Solutions Part 2: Trend Micro HouseCall
Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …
New Web application firewall appliance based on ModSecurity
Breach Security announced a new addition to its popular ModSecurity Pro web application firewall appliances product line with the launch of the ModSecurity Pro M1100. This new …
Virtual e-mail security appliance
IBM unveiled a virtual e-mail security solution based on the existing Proventia Network Mail Security System from its Internet Security Systems division. By allowing robust …
Top 20 virus list for July 2007
The activity of the botnet that was created in May via the Agent.bqs Trojan was only reaching its “design capacity” in June; by July it was in full swing. Another …
Watch the winning videos of college student security awareness contest
The EDUCAUSE/Internet2 Computer and Network Security Task Force, the National Cyber Security Alliance, and ResearchChannel have announced six winners of a computer security …
“Rough cut” of to-be-published book on Ajax security
Addison-Wesley released a “Rough Cut” of the forthcoming book Ajax Security. Rough Cuts, from Safari Books Online, allow readers to gain access to portions of a …
New application security software from SPI Dynamics
S.P.I. Dynamics announced WebInspect, according to the company, the first and only web application security assessment tool to be re-architected to thoroughly analyze …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)