Help Net Security
Lock the Door and Make Sure Your Data is Protected
You would think that at some point in time your children will reach the age at which you can reason with them, I’m hoping it’s a year older than the oldest one is …
Microsoft Excel virus and a ransomware trojan
It is very easy to know when Pahooka.A has infected a computer. Once run, it replaces the computer’s desktop wallpaper with a multicolored star on a blue background and …
Peer-to-peer software leaks confidential police data
IT security and control firm Sophos is reminding companies of the importance of enforcing stringent IT security policies after it was revealed that a Japanese policeman has …
Data protection made better with Encryptionizer
NetLib announced the availability of the company’s next release of its flagship product, NetLib Encryptionizer. The company’s enhanced data encryption solution …
LaCie unveils 2TB Big Disk Extreme+ with advanced backup software
LaCie unveiled the triple-interface Big Disk Extreme+ with LaCie Shortcut Button and included EMC Retrospect backup and recovery software for Windows/Mac OS. This versatile …
The Rules for Computer Forensics
The recovery of evidence from electronic devices is fast becoming another component of many the IT Manager’s remit. Electronic evidence gathered is often valuable …
How To Recover Forgotten Microsoft Word Passwords
Microsoft Office applications have an option for setting up different levels of passwords. They can be used for specific actions such as preventing reading, writing or adding …
The Simpsons used by cybercriminals to harvest email addresses
Sophos is reminding computer users of the importance of not responding to unsolicited email surveys following the discovery of a spam campaign that is exploiting interest in …
Euro six nations match the US in spam stakes
SophosLabs scanned all spam messages received in the company’s global network of spam traps, and have revealed that the US continues to relay more spam than any other …
Information on Pinch tool for creating custom Trojans
PandaLabs has uncovered Pinch, a tool sold on several online forums and designed to create Trojans. The tool lets cyber-crooks define a series of malicious actions that the …
Spam mails in PDF format flood the web
If you thought emails carrying embedded images are the current trend in spam town, it’s time to move on. According AntiVirus, AntiSpam and Content Security solution …
List of vulnerabilities fixed in the new 2.0.0.5 version of Firefox
Mozilla Firefox 2.0.0.5 web browser was just released. Here is a list of security vulnerabilities it fixes: MFSA 2007-25 XPCNativeWrapper pollution shutdown and moz_bug_r_a4 …
Featured news
Resources
Don't miss
- Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
- Microsoft revokes 200 certs used to sign malicious Teams installers
- A new approach to blockchain spam: Local reputation over global rules
- SAP zero-day wake-up call: Why ERP systems need a unified defense
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)