Help Net Security
Trojan in a fake Microsoft security bulletin
Sophos is warning users of a widespread attempt to infect email recipients by sending a warning about a bogus Microsoft security patch. The emails, which have the subject line …
PCI compliance and vulnerability scanning suite for just $99
Research published recently within the security industry confirms that, while PCI is important, it is only one part of a larger vulnerability management framework for …
The State of Database Security
Ted Julian is the VP of Marketing and Strategy at Application Security Inc. In this video he discusses the current state of database security and offers some insight on what …
API for OpenSSL developers to add elliptic curve cryptography to their applications
Certicom announced Security Builder API for Open Source to help OpenSSL developers easily add elliptic curve cryptography (ECC) to their applications. The SSL shim, or …
“Mind Games” – a psychology study on cyber criminals
In the study titled “Mind Games,” the primary author, Dr. James Blascovich, Professor of Psychology at the University of California, Santa Barbara, offers analyies …
Log-on to Windows computers with your fingerprint
IOGEAR just released Personal Security Mouse with Nano Technology (GMEFP1W6), a solution offering fingerprint scan to log-in to a computer Additional features include file / …
Season of security product beta testing contests
A couple of days ago we covered BitDefender’s new beta testing program where breaking their software could get you techie gear such as Sony Playstation 3, Microsoft …
Spammers deflate Pump and Dump spam tactics
According to the security provider Marshal, pump ‘n dump spam has dropped significantly. Stock spam now represents five percent of all spam compared to 50 percent in …
New Trend Micro security enhancement package for Windows Vista
Trend Micro today announced the availability of Trend Micro OS Protection, a security enhancement package for Windows Vista users running Trend Micro Internet Security. This …
Poison Ivy can take over your computer
The malware named PoisonIvy.r comes into computers through various online utilities, dubious software programs and movie downloads from infected websites. MicroWorld experts …
A closer look at Eraser, a secure data removal tool
Eraser is a secure data removal tool for Windows. It completely removes sensitive data from your hard drive by overwriting it several times with carefully selected patterns. …
Firefox Security and Privacy Extensions
In the last few years Firefox gained a massive support from surfers worldwide. This is mainly because Internet Explorer, still the biggest player on the market, has proved to …
Featured news
Resources
Don't miss
- Hackers probe, exploit newly patched BeyondTrust RCE flaw (CVE-2026-1731)
- Brutus: Open-source credential testing tool for offensive security
- Why secure OT protocols still struggle to catch on
- Edge computing’s biggest lie: “We’ll patch it later”
- Cyber risk is becoming a hold-period problem for private equity firms