Help Net Security
Total protection of confidential information redefined with PortAuthority 5.0
PortAuthority Technologies announced it has redefined what the industry has considered as total protection of confidential information with the release of PortAuthority v5.0, …
Mass market JAVA based secure identification service launched
Monitise Group announced the launch of its two factor authentication service – ACCODE. The new service, which is based on the banking grade security model behind …
PandaLabs warns users of the mass-mailing of false job offers
PandaLabs has detected the mass-mailing of messages with lucrative job offers, aimed at recruiting “mules’. In Internet slang, “mules’ are people used …
First and only web application discovery and security assessment solution for the enterprise launched
Cenzic, Inc unveiled Hailstorm Enterprise ARC (Application Risk Controller), the first product to address application security assessment across the enterprise. With its …
Protexx Security audit cracks cruise lines SSL and WEP Security
In a real-life version of Sneakers, the management of Radisson/Regent Cruise Lines asked Protexx, Inc. to perform a security audit on their ship’s network. During a …
WhiteHat Security Debuts Sentinel 3.0
WhiteHat Security, Inc., a leading provider of Web application security services, today announced WhiteHat Sentinel 3.0, the industry’s only continuous vulnerability …
Success of SPICON 2006, first web application security industry user conference
As Web application security concerns continue to escalate among top executives and those involved in all aspects of the application development lifecycle, S.P.I. Dynamics, …
Sourcefire files registration statement for initial public offering
Snort creators Sourcefire, Inc., announced that it filed a registration statement with the Securities and Exchange Commission for an initial public offering of common stock. …
Sophos extends application control to block distributed computing programs
Sophosas given companies the ability to control employees’ use of distributed computing applications on corporate networks, following concerns that these programs can …
Super Power Password Protection – Watching You Watching Me
Not a day goes by without some story hitting the wires about yet another piece of confidential information appearing in somebody’s inbox. Confidential emails, files, …
Data Storage Security – Quo Vadis
Today, industry trends are forcing security in the data center to be re-thought. In particular, the trend towards consolidation results in increasingly centralised data …
Featured news
Resources
Don't miss
- ClickFix campaign delivers Mac malware via fake Apple page
- Poisoned “Office 365” search results lead to stolen paychecks
- What vibe hunting gets right about AI threat hunting, and where it breaks down
- Health insurance lead sites sell personal data within seconds of form submission
- Claude helps researcher dig up decade-old Apache ActiveMQ RCE vulnerability (CVE-2026-34197)