Help Net Security
MicroWorld releases MailScan 5.0
MicroWorld Technologies today launched MailScan 5 for Mail Servers, the comprehensive Mail Security Solution at the Mail Gateway of organizations and business houses. eMail is …
RFID in the Supply Chain – A New Demand for Availability
Knowing where items are in your supply chain is crucial to maintaining an efficient manufacturing process, and anything that can improve and automate this process is always …
Info on SCVMan.B and Killav.FG trojans, Radoppan virus family
SCVMan.B is a backdoor Trojan that terminates several processes, including some belonging to certain security tools. It also collects information about the infected computer, …
20% of trojans in 2006 were designed to steal bank details
Banker Trojans, which represented twenty percent of all trojans detected in 2006, are programs designed to intercept access to bank websites and steal the information entered …
Phishers lure victims with false claims of eBay closure
Sophos is warning computer users of a new phishing scam that tries to steal usernames and passwords from eBay users by claiming the giant auction website will close for …
MacScan 2.3 Anti-Spyware for Mac OS X just released
SecureMac announced the release of MacScan 2.3, the latest version of the company’s industry leading anti-spyware package for Macintosh computers. SecureMac listens to …
“Storm Worm” on the tail of European Storm
A significant network attack was launched globally in the early hours of Thursday morning (GMT) using news of a European storm as the hook to lure the unsuspecting. The …
NetContinuum announces record year in 2006
NetContinuum announced a record year for 2006 in which its customer base doubled to nearly 200 while its market presence expanded to 22 countries with the recent addition of …
Cyberoam’s US partner CCNY places first purchase order worth $1.2 Million
Elitecore announced receiving the first order for 200 appliances from their North American Partner CCNY. This significant first order is an important milestone for Cyberoam to …
Panda joss-stick virus is no pandemic
Sophos has urged Windows users not to panic following reports of a ‘five-star cyber worm’ that is said to have infected ‘several million’ computers …
Crawling Ajax-driven Web 2.0 Applications
Crawling web applications is one of the key phases of automated web application scanning. The objective of crawling is to collect all possible resources from the server in …
Security threats Google mashup
eSoft, Inc. added an Internet and network threat information portal to its redesigned website. The statistics and information displayed on the portal are collected by …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)