Help Net Security
GRISOFT releases AVG Internet Security 7.5
GRISOFT, the supplier of AVG security software, today announced the global launch of AVG 7.5 security portfolio with the most comprehensive product line ever released. The …
Top Ten viruses most frequently detected by Panda ActiveScan in September 2006
September has followed the same trends as observed in previous months, characterized by a lack of massive epidemics albeit without any decrease in the activity of Internet …
Over 300 organizations now use Aventail Connect Mobile
Leading SSL VPN company Aventail today announced that over 300 organizations, including Mitsubishi Electronic Power Products, Trans State Airlines, and Mississippi Department …
New Sophos technology stops unknown malware threats before they execute
Sophos, a world leader in IT security, today announced the availability of its Host Intrusion Prevention System (HIPS), which proactively identifies and blocks programs that …
Top ten malware threats and hoaxes reported to Sophos in September 2006
The battle for the top position between Mytob.c and Nyxem.e continues for the third month in a row. After losing considerable ground in August, in September Nyxem improved its …
NEC Telenetworx chooses AEP Networks for SSL VPN solution
NEC Telenetworx, part of the NEC Networks & System Integration Corporation subsidiary of the NEC Group, has partnered with AEP Networks, the leader in Policy Networking …
Sophos top 10 malware threats and hoaxes in September 2006
Sophos, a world leader in IT security, has revealed the most prevalent malware threats and hoaxes causing problems for computer users around the world during September 2006. …
Study reveals major security flaws in most enterprises
Privileged passwords are the non-personal passwords that exist in virtually every device or software application in an enterprise, such as root on a UNIX server, Administrator …
A New Approach To Data Protection And Management
In the struggle to ensure data protection, reduce backup windows, and manage costs – both capital and operational – IT managers face increasing challenges. …
Lexmark introduces smart card security solution for federal government
Lexmark International has introduced a unique authentication solution for laser multifunction products (MFPs) in response to the stringent security standards of the U.S. …
Weekly Report on Viruses and Intruders – Spamta worm, Microsoft VML vulnerability
This week’s report from Panda Software looks at the appearance of numerous variants of the Spamta worm, -in particular, the CY variant- as well as the Microsoft VML …
O’Reilly releases “Google Hacks, Third Edition”
By adding it to the dictionary, Webster finally made “google” an official verb. But Google today is so much more than googling the new boss or ex-boyfriend, and …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems