Help Net Security
Early-warning system for Web 2.0 threats
Websense unveiled new technology that finds security attacks launched within Web 2.0 applications and delivers threat protection to customers within minutes. While Web 2.0 …
Oracle’s new centralized security and user authentication services for Linux
Oracle announced the preview release of Oracle Authentication Services for Operating Systems, a new offering within Oracle Identity Management. It is designed to make user …
New corporate antispyware solution with antivirus functions
Webroot Software announced the release of Webroot AntiSpyware Corporate Edition with AntiVirus. In addition to compatibility with the Windows Vista operating system, key new …
Bank changes its name, phishers smell the potential
UTI bank, one of the leading banks in India has changed its name to “Axis’. And who better than phishers know to fish in the muddy waters of confusion. Security …
Guide to Online Antivirus Solutions Part 3: Kaspersky Online Scanner
Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …
Watch out for cyber sharks – new tool for creating trojans
PandaLabs has discovered Shark 2, a tool for creating Trojans which is being distributed on several Internet forums. Its creators have launched several updates, so there are …
Zero-hour virus outbreak detection
New 5.0 version of Commtouch Enterprise Anti-Spam Gateway now includes Zero-Hour Virus Outbreak Detection to complement traditional enterprise Anti-Virus solutions and block …
First Response warns customers after data breach
Following a recent break-in at its offices, First Response has admitted the loss of storage discs containing sensitive information of its current and former customers, warning …
Malware uses Hotmail and Gmail as spam hosts
A joint effort between the BitDefender and Yahoo security teams appears to have stymied the criminals behind Trojan.Spammer.HotLan to generate and use Yahoo accounts to send …
Financial services institutions battle with data loss
New research from TowerGroup finds that businesses are not doing nearly enough to prevent the loss or theft of customers’ personal information. The pace of data loss is …
Practical tips for information protection
The new school year means new friends, new classes, and often a new computer to help get schoolwork done. Mobile computers in particular can also contribute to problems …
Compliance, IT Security and a Clear Conscience
Never has the need to prove compliance with external regulations and internal policies been more acute than it is today. The likely consequences of failing to prove that your …
Featured news
Resources
Don't miss
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders
- Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info