Help Net Security
NetSky was the top worm in February
In last month’s Top Twenty, we noted that Warezov worms had been almost totally beaten back by Bagle. Only a single Warezov variant remained in January’s Top …
A closer look at ArmyMovement.A and SpamtaLoad.DO trojans
The SpamtaLoad.DO Trojan spreads via email using subjects such as “Error”, “Good day” or “hello”. The body text varies, usually …
New Windows Vista-compatible beta version of AdminSecure
The new version of AdminSecure, Panda Software’s network security management console, is fully compatible with Windows Vista. The product allows administrators to set a …
nCipher extends key management to System i
nCipher plc announced its keyAuthority enterprise key management suite now supports IBM System i platforms (AS/400). Through a partnership with Patrick Townsend & …
Tizor launches first data auditing and protection blog
Tizor Systems announced the launch of the DataAuditingBlog, the first blog about data auditing and its related subjects, which is located at Authored by Prat Moghe, founder …
SteelEye Technology announces support for IBM System i platform
SteelEye Technology announced the expansion of its product set with the immediate availability of its high availability clustering, continuous data protection and disaster …
Solaris turkey worm talks its way through telnet flaw
Sophos is warning computer users of all operating systems of the dangers of malware, as an internet worm that displays offensive messages and cartoon images of talking turkeys …
Malware adopts disguises in attempt to dupe IT defences
Sophos has revealed the most prevalent malware threats and email hoaxes causing problems for computer users around the world during February 2007. The figures, compiled by …
Over 50% of infections detected in February were spyware and trojans
Spyware and Trojans were the malware responsible for most infections in February. As in January, spyware accounted for 33 percent of the infections detected by ActiveScan. …
Top 10 WordPress Anti Spam Plugins
Blog spam is a huge problem but fortunately protection is available and in a few steps you can make sure you are protected. Check out the plugins below, one of them will …
O’Reilly Releases Backup & Recovery
Using a system without backups is like driving your car 100 miles per hour down a busy road the day after your insurance policy expires. Exhilarating, yes. But you know …
Vista tip of the day: Security and Roles in Vista
This video will show you the basics when it comes to protecting your computer from an outside source.
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025