Help Net Security
HNS Podcast: Common Mistakes Made By IT Administrators
George Gerchow has more than 12 years of IT and systems experience in Education, Finance and Government environments. He is the Technology Strategist for Configuresoft and a …
Video on targeted attacks
F-Secure’s Mikko Hypponen discusses the issue of Targeted Attacks.
Spyware Doctor gets a major overhaul
To make award-winning Spyware Doctor even more potent, PC Tools developers spent nearly two years rewriting their bullet-proof anti-malware technology to combat the next …
Securent joins with OASIS
Securent announced that it is a Sponsor Member of the Organization for the Advancement of Structured Information Standards (OASIS). OASIS is a not-for-profit, international …
Web application security tool extended for checking .NET applications
Fortify Software announced the extension of its Fortify Defender solution for applications written in the .NET language. Fortify Defender’s sophisticated technology …
nCipher payShield used by a leading bank in Croatia
nCipher announced that its payShield hardware security module (HSM) has been deployed at the core of a new telephone and internet banking system in Croatia. Privredna Banka …
2006 – a good year for Cyber-Ark
According to Cyber-Ark, 2006 marked a year of tremendous prosperity and growth in the emerging Privileged Password Management (PPM) market as regulatory compliance, along with …
First EAL4 evaluation to Swedish Common Criteria Scheme
atsec information security AB is performing an EAL4+ evaluation of Tutus Data AB F?¤rist VPN and Firewall for certification by the Swedish Certification Body for IT Security …
Biometrics: What and How
Humans use body characteristics to recognize each other. Some characteristics don’t change over time and some do. What characteristics do we use for identifying people? …
New solution in the secure file storage market
Dekart launched a new software product, Dekart File Move. This application is a real breakthrough in the secure files storage field. Private Disk File Move is designed to …
Malware of the week: Piggi.B worm, ReverseClick.A trojan and VideoCach adware
The Piggi.B worm, the ReverseClick.A Trojan, the VideoCach adware, and the potentially unwanted program (PUP) XPCSpy are the subject of this week’s PandaLabs report. The …
Vulnerability in the IPv6 protocol stack of OpenBSD
CoreLabs discovered that the OpenBSD kernel contains a memory corruption vulnerability in the code that handles IPv6 packets. Exploitation of this vulnerability can result in …
Featured news
Resources
Don't miss
- Product showcase: Penetration test reporting with PentestPad
- Sensitive data of Eurail, Interrail travelers compromised in data breach
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
- LinkedIn wants to make verification a portable trust signal