Help Net Security
Top 5 Tips to NOT Get Hacked Online
“Oh my God, I’m never doing anything on-line again!,” is a common reaction to one of my web application hacking presentations. Recently I’ve been …
Generate spreadsheet reports that are delivered securely
Actuate announced the availability of Actuate 9 e.Spreadsheet, including the new SmartSheet Security Option. Actuate 9 e.Spreadsheet gives users information in a format that …
Raman Amplification in Storage Area Networking
Enterprise requirements for business-continuity and disaster-recovery solutions continue to grow more demanding. An example can be found in the drive to lengthen the distances …
(ISC)2 implements PGP for secure messaging
The International Information Systems Security Certification Consortium [(ISC)2] has standardised on the PGP Encryption Platform. (ISC)2 is using PGP Universal for gateway …
Weekly Report on Viruses and Intruders -Wapplex.C, Sohanat.A, Ajax, VML.A
This week’s report from Panda Software focuses on the Wapplex.C and Sohanat.A worms, the adware program Ajax and the exploit VML.A, designed to take advantage of a …
Complete and real-time coverage of distributed IT infrastructures
Insightix released its Insightix Management Center which enables an enterprise with multiple networks across geographically distributed locations to easily achieve a unified …
Secure and reliable managed file transfer with Secure Transport 4.6
Tumbleweed Communications announced the availability of Tumbleweed SecureTransport 4.6, the latest version of Tumbleweed’s award-winning enterprise managed file transfer …
Honeywell Security Group – European security company of the year
The 2006 Frost & Sullivan European Security Company of the Year Award in the building technologies area is presented to Honeywell Security. Honeywell has responded to …
Flaw in Internet Explorer rings security alarm
A critical vulnerability is identified in Internet Explorer versions 5+ and above. Security experts at MicroWorld Technologies say a malicious code named Exploit.HTML.VML is …
Application Security founder and CTO presents best practices for securing databases
Application Security’s founder and CTO Aaron Newman will team with Computerworld to present a webcast designed to help organizations combat the theft of customer …
A false virtual postcard infects computers
PandaLabs has detected false virtual postcard messages that aim to infect computers with Dadobra.ND (a downloader Trojan) and Banbra.CLQ (a banking Trojan). The cyber-criminal …
Syhunt introduces Sandcat Professional Edition 2.7
Syhunt Technology released Sandcat Professional Edition 2.7, the latest release of Syhunt’s powerful fault-injection test tool. Sandcat now provides OWASP PHP Top 5 …
Featured news
Resources
Don't miss
- Life, death, and online identity: What happens to your online accounts after death?
- OpenFGA: The open-source engine redefining access control
- For blind people, staying safe online means working around the tools designed to help
- 3 DevOps security pitfalls and how to stay ahead of them
- CISA warns of Windows SMB flaw under active exploitation (CVE-2025-33073)