Help Net Security
Number of cyber attacks on banks up 81% since last year
SecureWorks reserach shows that the number of hackers attempting to attack its banking clients is up 81% since last year and hackers attempting to attack its credit union …
Two-thirds of all email blocked based on sender reputation
St. Bernard Software’s LivePrism filtering solution blocked two-thirds of its customers’ incoming email in July based solely on sender reputation without having to …
PDF Spam: A Step Ahead of Image Spam
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the …
Spammed out “shocking photos” emails contain malicious payload
Sophos is urging computer users to think before opening unsolicited email attachments following the discovery of a widespread malicious spam campaign that claims to contain …
Poorly managed web encryption confusing consumers
Nearly half of consumers experiencing website security alerts ignore the alert and proceed to do business on the site, putting at risk their personal and financial data, …
List of ICSA Labs certified Virtual Private Network products
ICSA Labs has certified safeguards for four virtual private network products. The VPN products earning ICSA Labs Secure Sockets Layer-Transport Layer Security (SSL-TLS) VPN …
Guide to Online Antivirus Solutions Part 2: Trend Micro HouseCall
Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …
New Web application firewall appliance based on ModSecurity
Breach Security announced a new addition to its popular ModSecurity Pro web application firewall appliances product line with the launch of the ModSecurity Pro M1100. This new …
Virtual e-mail security appliance
IBM unveiled a virtual e-mail security solution based on the existing Proventia Network Mail Security System from its Internet Security Systems division. By allowing robust …
Top 20 virus list for July 2007
The activity of the botnet that was created in May via the Agent.bqs Trojan was only reaching its “design capacity” in June; by July it was in full swing. Another …
Watch the winning videos of college student security awareness contest
The EDUCAUSE/Internet2 Computer and Network Security Task Force, the National Cyber Security Alliance, and ResearchChannel have announced six winners of a computer security …
“Rough cut” of to-be-published book on Ajax security
Addison-Wesley released a “Rough Cut” of the forthcoming book Ajax Security. Rough Cuts, from Safari Books Online, allow readers to gain access to portions of a …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits