Help Net Security
Data privacy with Folder Security Personal
Y0YS Software has announced the immediate availability of Folder Security Personal 4.1, a fully-fledged security tool for Windows OS. Folder Security Personal (FSP) gives you …
Verizon Business to acquire Cybertrust and ICSA Labs
Verizon Business today announced a definitive agreement under which it will acquire Cybertrust, a privately held provider of global information security services. Financial …
New release of Intellitactics Security Manager features security know how
With this release, Intellitactics adds more capability for speedy implementation and simplified use so that more companies can enjoy the benefits to be reaped from effective …
The first mobile SSL VPN for Smartphones
Aventail announced Aventail Connect Mobile for smartphones—the industry’s first and only SSL VPN to provide full support and secure end point control for Windows Mobile …
Results from Distributed Open Proxy Honeypot Project
Breach Security announced the results of the Web Application Security Consortium’s (WASC) new Distributed Open Proxy Honeypot Project. The Honeypot Project is capturing …
Fortify integrates intellectual property from the Secure Software acquisition
Fortify Software announced the release of a major update to the Fortify Secure Coding Rulepacks. The update includes the integration of intellectual property obtained from …
F-Secure Anti-Virus for Microsoft Exchange Version 7 just released
F-Secure today announced the availability of the newest addition in its family of corporate data protection solutions: F-Secure Anti-Virus for Microsoft Exchange Version 7. It …
Weekly report on viruses, trojans and malware
This week’s PandaLabs’ report focuses on three Trojans, Alanchum.VL, Downloader.OHC and Cimuz.FH, and a worm that spreads through instant messaging, MSNDiablo.A. …
File Anti-Copy 3.1 security utility released
HiHiSoft has announced the immediate availability of File Anti-Copy 3.1, a simple security utility that will protect selected files from being opened, copied, or deleted …
160,000 computers infected with Mpack malware downloader
An exploit detected by NanoScan led PandaLabs on the trail to uncover Mpack, a program used to download malware onto remote computers by exploiting numerous vulnerabilites. …
How To Prepare For a Security Information and Event Management Deployment
Fail to prepare, as the saying goes, and you prepare to fail. This maxim certainly applies to most large-scale IT projects, and doubly so for Security Information and Event …
Transportation Security Administration sued for reckless violation of the Privacy Act
Calling the recent loss of employee personal data a breach of the Privacy Act, the American Federation of Government Employees (AFGE) — which represents employees …
Featured news
Resources
Don't miss
- Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims
- A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn
- Why your security strategy is failing before it even starts
- Protecting mobile privacy in real time with predictive adversarial defense
- Los Alamos researchers warn AI may upend national security