Help Net Security
Backdoor worm targets vulnerability in Microsoft Word
New variant of a Trojan Downloader is actively exploiting a recently found vulnerability in Microsoft Word 2000, informs Security Experts at MicroWorld Technologies. The …
Panda ActiveScan: top virused detected in August 2006
August has witnessed the same trend observed over the last few months with regard to computer threats. The current apparent calm in malware activity is simply due to a new …
How Personal & Internet Security Works
For majority of us working in information technology, knowledge on security and privacy topics is something that we need to possess. There are hundreds, or better say it …
New version of Pointsec Linux encryption software released
Pointsec announced the latest version of its endpoint encryption software for Linux desktops and laptops, Pointsec for Linux 2.0. Committed to its continued support of …
NETGEAR announces new SSL VPN Concentrator 25 appliance
NETGEAR announced the availability of the ProSafe SSL VPN Concentrator 25 (SSL312), an easy-to-use and reliable SSL VPN Solution that delivers clientless, secure remote access …
New ZyXEL Wi-Fi Finder device
The new ZyXEL AG-225H is being advertised as the ultimate high-tech tool for the road warriors. It combines a 802.11a/b/g USB 2.0 adapter with a fully functional wireless …
LaCie biometric hard drives for Macs
LaCie now offers a full range of secure desktop and mobile hard drives with biometric access control designed to protect confidential data from unauthorized use. The new LaCie …
Secure Computing launches new identity and access management appliance
Secure Computing Corporation announced the availability of its SafeWord SecureWire 50 identity and access management (IAM) appliance – the remote access, authentication …
SAP selects Breachview SSL
Breach Security, Inc. announced that SAP AG, the world’s leading provider of business software solutions, has chosen Breachview SSL to enhance its ability to detect …
The Changing Face of Disaster Recovery
Disaster recovery and remote office replication are increasingly becoming top-of-mind issues for IT professionals. It is ironic that tape, the most operationally unpredictable …
Secure Computing Closes Acquisition of CipherTrust
Secure Computing Corporation announced that it has closed its acquisition of CipherTrust. This merger firmly establishes Secure Computing as a dominant player in the …
Kaspersky Lab list of top viruses for August 2006
Position Change in position Name Percentage 1. 0 Net-Worm.Win32.Mytob.c 26.43 2. 0 Email-Worm.Win32.Nyxem.e 14.42 3. 0 Email-Worm.Win32.NetSky.b 8.06 4. 0 …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems