Help Net Security
A closer look at UserLock access and control software
UserLock is a tool for securing access to Windows networks by restricting simultaneous sessions, by limiting user access to the network and by providing administrators with …
A good week for trojans and worms
This week’s PandaLabs report provides information about Harrenix.A, a dangerous Trojan that disguises itself as a trailer for the latest Harry Potter movie in order to …
Backdoor discovered in popular financial planning software
Elcomsoft has discovered a backdoor in Intuit’s Quicken software. Millions of people worldwide have chosen Quicken as their financial software, in part because of …
PGP Corporation receives $27.3 million in Series C funding
PGP Corporation has announced it has closed $27.3 million in Series C funding. The round adds new investors Intel Capital, the venture capital arm of Intel Corporation, and …
Tips for protecting against malware, scams and identity theft
Don’t add friends you don’t actually know when using social networking sites. Often the “free” code available in social networking sites, such as …
Spammers turn to PDF files in latest pump-and-dump scam
Sophos is warning of a new ‘pump-and-dump’ stock spam campaign which uses a PDF file to hoodwink potential investors. Sophos has identified email messages being …
Virtualisation adopters face security challenges
Virtualisation is moving into the mainstream with 50% of IT professionals already using this new technology, or planning to do so within the next 18 months, reveals a survey …
USB Flash Drive worm from the “good guys”
Sophos has discovered a worm which copies itself onto removable drives, such as USB flash drives, in an attempt to spread information about AIDS and HIV. The LiarVB-A worm …
Secure Computing updates its URL filtering solution
Secure Computing announced a new version of SmartFilter 4.2 with TrustedSource. It provides granular protection against today’s Web 2.0 threats, allowing companies to …
Create Password Protected PDF Files On Your Mac
In the office I often use different word processors and text writing software applications. The majority of my output files are generated by the nifty (especially for a long …
Designing IS strategies to stay ahead of network threats
Headline-grabbing news about computer security breaches and their devastating consequences on an agency and its constituents is the stuff of every CSO’s nightmare, …
Hackers insert footage of nuclear explosion into webcam
Czech hackers managed to get access to a webcam and insert realistic footage of nuclear explosion. The incident was broadcasted on the Czech TV programme Panorama on Sunday. …
Featured news
Resources
Don't miss
- How global collaboration is hitting cybercriminals where it hurts
- Vet: Open-source software supply chain security tool
- Bankers Association’s attack on cybersecurity transparency
- Attackers breached ConnectWise, compromised customer ScreenConnect instances
- Product showcase: Smarter pentest reporting and exposure management with PlexTrac