Help Net Security
Bluesocket unveils new WLAN security product portfolio
Bluesocket, Inc. announced a new series of leding-edge BlueSecure Controllers that incorporate Bluesocket’s Secure Mobility technology for wireless data and voice …
Truston announces Identity Theft Prevention and Recovery Service
Truston announced the availability of myTruston, an online, interactive set of identity theft protection tools designed to help victims and aid in preventing and recovering …
A new SpamtaLoad worm is starting to spread rapidly
PandaLabs has detected a huge number of emails containing the SpamtaLoad.DO Trojan. In fact, the Trojan was present in up to 40 percent of the infected messages received by …
Trend Micro updates its Gateway Messaging Security solution
Trend Micro Incorporated announced the latest versions of its messaging security products, InterScan Messaging Security Suite and InterScan Messaging Security Appliance, and …
CounterSpy Version 2 awarded with Checkmark Certification
Sunbelt Software announced that CounterSpy Version 2 has achieved West Coast Labs’ Checkmark certification in the Anti-Spyware Desktop category. Following a series of …
VeriSign’s Card Management System receives certification from GSA for HSPD-12
VeriSign, Inc. announced today that its Card Management System (CMS) has been certified under the General Services Administration (GSA)-managed FIPS 201 Evaluation Program. …
FortiClient earns fifth Virus Bulletin 100% award
Fortinet today announced that its FortiClient end-point security software has earned its fifth consecutive Virus Bulletin 100% award for its best-in-class antivirus …
Modulo Security introduces Risk Manager to the US market
Modulo Security introduced to the US market their Risk Manager, a powerful system that has been used in more than 4,000 projects and provides structured risk assessment for …
US man pleads guilty to spreading ITC trojan horse
Sophos is welcoming news that a US man has pleaded guilty to charges of writing and distributing a Trojan horse designed to steal usernames and passwords from computer users. …
How to use OpenID?
This is a short screencast explaining OpenID and showing how you can use it to log in to several different sites without having to set up a new username and password for each one.
A closer look at Burglar.A. trojan and the USBToy.A and Naiba.A. worms
The Burglar.A Trojan can be damaging for users. It spreads by email announcing that Australia’s Prime Minister has suffered a heart attack or some other illness. Some of …
Bluefire Mobile Security Professional Edition version 4.0 released
Bluefire today announced the availability of the Bluefire Mobile Security Professional Edition version 4.0. It is designed to secure devices using Microsoft’s Windows …
Featured news
Resources
Don't miss
- 300k+ Plex Media Server instances still vulnerable to attack via CVE-2025-34158
- AI Security Map: Linking AI vulnerabilities to real-world impact
- How compliance teams can turn AI risk into opportunity
- Hottest cybersecurity open-source tools of the month: August 2025
- What CISOs can learn from Doppel’s new AI-driven social engineering simulation