Help Net Security
Apple Video iPods with pre-installed Windows malware
A number of Video iPods have been shipped containing Windows malware. In a statement on its website, Apple has confirmed that some Video iPods available for purchase after 12 …
BitDefender proves Virus Bulletin judges wrong
BitDefender today announced that BitDefender 10 was awarded VB100% certification from Virus Bulletin for its ability to detect 100% of the viruses on the WildList. Tested by …
Cisco releases Secure Services Client 4.0
Cisco unveiled the Cisco Secure Services Client 4.0 – advanced security software that provides enterprises with a single authentication framework for multiple devices to …
Cyber-Ark announces Enterprise Password Vault 4.0
Cyber-Ark Software announced the release of the latest edition of its flagship product, Enterprise Password Vault version 4.0. EPV 4.0 delivers a wide array of vital …
Problems caused by Adobe Flash Player Plugin vulnerability
Two vulnerabilities found in Adobe Flash Player provide opportunity to attackers to send arbitrary HTTP requests from an unsuspecting user’s browser, reports Rapid7 LLC …
New variants of the Haxdoor Trojan discovered
PandaLabs informs that over the last few days, several variants of the Haxdoor family of Trojans have emerged. These Trojans use rootkit functions and try to steal …
St. Bernard Software Completes Acquisition of Singlefin
St. Bernard Software has completed its acquisition of Singlefin, pursuant to the Agreement and Plan of Merger Reorganization between the companies announced October 4, 2006. …
Hyperic enhances enterprise-class software security
Hyperic Inc. enhanced the security of its Hyperic HQ IT management platform with a comprehensive code audit, courtesy of Fortify Source Code Analysis. The audit, together with …
Crossroads Systems joins Cyber Security Industry Alliance
Crossroads Systems, Inc. announced it has joined the Cyber Security Industry Alliance (CSIA) as a principal member. CSIA is the only advocacy group dedicated to ensuring the …
Data Protection Management: Shedding Light on Complex Infrastructures
Data protection strategies have become significantly more complex in recent years. Companies that used to rely on a single-vendor tape backup solution are now using disk-based …
SafeNet introduces Sentinel Hardware keys for Red Hat Linux
SafeNet, Inc. announced the release of Sentinel Hardware Keys for Linux platforms, allowing software developers in the Linux community to protect 32-bit software applications …
ISS Server protection products support Red Hat Enterprise Linux 4.0 and Solaris 10
Internet Security Systems announced that it is the first enterprise security company to provide server security protection for the latest Linux and Solaris operating systems, …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?