Help Net Security
eSoft launches Desktop Anti-Virus/Spyware Suite
eSoft announced the availability of its Desktop Anti-Virus/Spyware Suite, which allows administrators to manage PC security across the entire organization through a single …
Drive-by Pharming – a new threat?
Symantec Security in conjunction with the Indiana University School of Informatics has uncovered a significant new security threat. In this attack, dubbed “Drive-by …
Valentine’ Day and a patch offering worms
Nurech.B is the second variant of the Nurech family detected over the last few days. Like its predecessor, Nurech.A, this worm has used the days running up to …
Perpetrators of an $300,000 internet bank theft arrested
Sophos reported that the police in the Turkish city of Izmir have arrested 17 members of a gang who broke into online bank accounts and stole $300,000 from internet users. Law …
Malware Radar – new automated malware audit service
Panda Software announced Malware Radar, a new automated malware audit service, which detects the threats that slip past traditional solutions. This innovative solution …
Crossroads Systems announces DBProtector 2.0
Crossroads Systems announces DBProtector 2.0 Crossroads Systems, Inc. announced that Crossroads’ DBProtector 2.0 will begin its early adopter phase this month with …
Cryptography Research, Inc. expands team to meet increasing demand for embedded systems security
Cryptography Research, Inc. announced the appointment of Luke Teyssier to senior staff engineer. In response to growing demand for embedded systems security, Teyssier joins …
Mid East hackers challenge offers $6,000 in cash prizes
Hack In The Box announced that it will be hosting a Capture the Flag (“CTF”) hacking competition during the upcoming HITBSecConf2007 with USD6,000 in cash prizes …
Results of the first ICSA Microsoft Windows Vista Anti-Virus certification program
ICSA Labs announced the results of the industry’s first anti-virus certification testing program for desktop/server anti-virus products designed for the Microsoft …
Scanning Ajax for XSS Entry Points
The continuous adoption of Web 2.0 architecture for web applications is instrumental in Ajax, Web services and Flash, emerging as key components. Ajax is a combination of …
(IN)SECURE Magazine Issue 10 released
(IN)SECURE Magazine is a freely available digital security magazine discussing some of the hottest information security topics. Issue 10 was just released. Download it from: …
AT&T offers new parental controls with AT&T Smart Limits
The new AT&T Smart Limits brings together information for parental control features for a suite of AT&T services — wireless, wireline, high speed Internet access …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous