Help Net Security
Best practices for building a network assurance program
Lumeta introduced five critical considerations to help organizations develop a Network Assurance program. Network Assurance complements system and data level security …
First virus that automatically changes your blog comments and web-based emails
Secure Computing warns that blogs, bulletin boards and webmail are now being spammed with messages to visit a website to view “fun” videos. Secure Computing has …
Analysis: World Wireless Intrusion Detection and Prevention Systems Market
The increased uptake of wireless in both the consumer and the enterprise markets is driving the Wireless Intrusion Detection and Prevention Systems (WIDPS) market. Increased …
Marvell announces support for Microsoft Network Access Protection Technology
Marvell announced support for Microsoft Network Access Protection technology. By combining robust network security with Microsoft’s Network Access Protection, Marvell …
New product that offers strong encryption for PDAs and Windows smartphones
Aiko Solutions announces the release of SecuBox for Pocket PC – the software for protecting confidential data carried on Windows driven PDAs and smartphones. SecuBox for …
Phishers try to pull a fast one on Bank of America customers
A new Phishing mail in circulation, drafted to look like an official Annual Account Review notification from Bank of America, tries to pilfer personal financial information of …
NetSky was the top worm in February
In last month’s Top Twenty, we noted that Warezov worms had been almost totally beaten back by Bagle. Only a single Warezov variant remained in January’s Top …
A closer look at ArmyMovement.A and SpamtaLoad.DO trojans
The SpamtaLoad.DO Trojan spreads via email using subjects such as “Error”, “Good day” or “hello”. The body text varies, usually …
New Windows Vista-compatible beta version of AdminSecure
The new version of AdminSecure, Panda Software’s network security management console, is fully compatible with Windows Vista. The product allows administrators to set a …
nCipher extends key management to System i
nCipher plc announced its keyAuthority enterprise key management suite now supports IBM System i platforms (AS/400). Through a partnership with Patrick Townsend & …
Tizor launches first data auditing and protection blog
Tizor Systems announced the launch of the DataAuditingBlog, the first blog about data auditing and its related subjects, which is located at Authored by Prat Moghe, founder …
SteelEye Technology announces support for IBM System i platform
SteelEye Technology announced the expansion of its product set with the immediate availability of its high availability clustering, continuous data protection and disaster …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware