Help Net Security
Security Economics
Information security has finally become mainstream. It is almost a recognized profession, with its own areas of specialization: network security, audit, incident response, …
Symantec releases Norton Internet Security 2008, Norton AntiVirus 2008
Symantec launched Norton Internet Security 2008 and Norton AntiVirus 2008, industry leading security solutions that have been enhanced to provide computer users with …
5 Security Widgets for the Opera Browser
Widgets are Web programs you can run right on your desktop using Opera 9. This article introduces security-related widgets that will enhance your Opera experience. …
Intel vPro processor technology fortifies security
Intel further reinforced desktop PC security by unveiling the newest generation of Intel vPro processor technology for businesses and IT with new innovations that add better …
A closer look at Cryptainer LE: your own secure hidden data vaults
This tool enables you to secure your data and ensure that you are doing the best for your privacy. Cryptainer LE uses 256 bit AES encryption and works by creating multiple 25 …
Video: User Account Control in Windows Vista
Jason Fossen, an instructor at the SANS Institute, discusses the controversial User Account Control in Windows Vista.
Price list: trojans, password stealers, spam servers
Just over a thousand dollars can buy a cyber-crook the tools needed to turn malicious action into financial profit, according to data from PandaLabs. This is thanks to a black …
The state of data security in North America
RSA announced the results of a survey commissioned by RSA entitled “The State of Data Security in North America.” Conducted by Forrester Consulting, the survey …
New web security and web filtering solutions for small businesses
GFI Software announced the release of the latest version of GFI WebMonitor for ISA Server, a solution that gives administrators comprehensive control over corporate web usage …
Designing a PCI-Compliant Log Monitoring System
Log monitoring activities are an integral part of Requirement 10 of the PCI Data Security Standard and it can be difficult to understand how the different logging portions of …
MSN worm with downloader functionality
The most important malware samples analyzed by PandaLabs this week are the MSNHorn.A and Nugache.M worms, and the Legmir.ASG Trojan. MSNHorn.A spreads through MSN Messenger by …
Guide to Online Antivirus Solutions Part 5: BitDefender Online Scanner
Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …
Featured news
Resources
Don't miss
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders
- Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers