Help Net Security
Trojan in a fake Microsoft security bulletin
Sophos is warning users of a widespread attempt to infect email recipients by sending a warning about a bogus Microsoft security patch. The emails, which have the subject line …
PCI compliance and vulnerability scanning suite for just $99
Research published recently within the security industry confirms that, while PCI is important, it is only one part of a larger vulnerability management framework for …
The State of Database Security
Ted Julian is the VP of Marketing and Strategy at Application Security Inc. In this video he discusses the current state of database security and offers some insight on what …
API for OpenSSL developers to add elliptic curve cryptography to their applications
Certicom announced Security Builder API for Open Source to help OpenSSL developers easily add elliptic curve cryptography (ECC) to their applications. The SSL shim, or …
“Mind Games” – a psychology study on cyber criminals
In the study titled “Mind Games,” the primary author, Dr. James Blascovich, Professor of Psychology at the University of California, Santa Barbara, offers analyies …
Log-on to Windows computers with your fingerprint
IOGEAR just released Personal Security Mouse with Nano Technology (GMEFP1W6), a solution offering fingerprint scan to log-in to a computer Additional features include file / …
Season of security product beta testing contests
A couple of days ago we covered BitDefender’s new beta testing program where breaking their software could get you techie gear such as Sony Playstation 3, Microsoft …
Spammers deflate Pump and Dump spam tactics
According to the security provider Marshal, pump ‘n dump spam has dropped significantly. Stock spam now represents five percent of all spam compared to 50 percent in …
New Trend Micro security enhancement package for Windows Vista
Trend Micro today announced the availability of Trend Micro OS Protection, a security enhancement package for Windows Vista users running Trend Micro Internet Security. This …
Poison Ivy can take over your computer
The malware named PoisonIvy.r comes into computers through various online utilities, dubious software programs and movie downloads from infected websites. MicroWorld experts …
A closer look at Eraser, a secure data removal tool
Eraser is a secure data removal tool for Windows. It completely removes sensitive data from your hard drive by overwriting it several times with carefully selected patterns. …
Firefox Security and Privacy Extensions
In the last few years Firefox gained a massive support from surfers worldwide. This is mainly because Internet Explorer, still the biggest player on the market, has proved to …
Featured news
Resources
Don't miss
- Sensitive data of Eurail, Interrail travelers compromised in data breach
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
- LinkedIn wants to make verification a portable trust signal
- QR codes are getting colorful, fancy, and dangerous