Help Net Security
Fake BBC report spreads Berlusconi death claim and malicious trojan
IT security firm Sophos is warning users about a new Trojan horse that has been spammed out to email addresses disguised as a breaking BBC news report claiming the death of …
Panda Software launches GateDefender Integra
Panda Software presents the new Panda GateDefender Integra, an all-in-one appliance for protecting against all types of threats. It offers excellent performance, a low cost of …
Assessing Java Clients with the BeanShell
Assessing the security of Java applications, and particularly client-server applications, can be a tedious process of modifying the code, compiling, deploying, testing and …
What Should Businesses Require of Data Protection Solutions?
Data protection today is one of the most innovative and fast-moving areas of Information Technology. Data protection technology developers have, in recent years, engaged in …
DOJ Deploys AppSecInc’s vulnerability assessment technology
Application Security announced that the United States Department of Justice (DOJ) is utilizing the company’s vulnerability assessment scanner, AppDetective to reduce and …
Sensitive information can still be found on second hand disks
BT, the University of Glamorgan in Wales and Edith Cowan University in Australia today issued a report based on research to determine whether second hand computer disks that …
Worms exploit critical Microsoft security vulnerability
Sophos is warning computer users of malware that is exploiting a critical security vulnerability in Microsoft software, and urging companies to roll-out security patches as a …
Mac Password Generator 1.0 released
Password Generator is a Mac OS X application that allows users to generate strong passwords for all their accounts. Of significant note, this release allows users to customize …
First portable anti-spyware product for U3 smart drive platform
ParetoLogic announced XOFTspy Portable Anti-spyware product, the first portable anti-spyware product operating directly from U3 smart drives. Built on its popular anti-spyware …
New worm claims to show you pictures of Paris
If you get an email from one of your friends, with a subject line-“My Photo on Paris’, do not click and download the zipped attachment. The poor fellow has …
Info on HITBSecConf2006 Capture The Flag contest
Hack In The Box (M) Sdn. Bhd. has announced that it will once again host the region’s best known Capture The Flag hacking competition during the upcoming HITBSecConf2006 …
How to Start Up a Mobile Security Project
The proliferation of laptops, PDAs, smartphones and USB sticks means that corporate data is no longer confined to the office. Without a joined-up policy on mobile security, …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)