Help Net Security
New Netilla Security Platform (NSP) SSL VPN Product
AEP Networks unveiled the latest version of its AEP Netilla Security Platform (NSP) SSL VPN. The NSP Release 5.4 includes several performance improvements, new certifications, …
VeriFinger 5.0 SDK for biometric fingerprint recognition comes to Mac OS X
The VeriFinger 5.0 Software Development Kit (SDK) is the first major fingerprint identification SDK to add support for the Mac OS X platform. VeriFinger 5.0 provides both 1:1 …
ScanSafe achieves Microsoft Gold Certified Partner status
ScanSafe has achieved Microsoft Gold Certified Partner status in the Microsoft Partner Program. Microsoft Gold Certified Partners have demonstrated the highest degree of …
Information security expert and industry veteran Michael Sutton joins SPI Dynamics
S.P.I. Dynamics, the expert in Web application security, today announced the addition of Michael Sutton, information security industry veteran, to the company as Security …
Exploiting vulnerabilities to infect computers has become a priority for cyber-crooks
Over the last few months we have witnessed a notable increase in exploits of security problems in commonly-used programs that could allow remote attacks by cyber-crooks. This …
Smoothwall protects against Internet Explorer Direct Animation Path ActiveX exploit
Internet security specialist SmoothWall announced that users of its Corporate Guardian, SmoothGuardian and School Guardian web security and content filtering systems have …
AES Software releases AES Password Manager 2.0
AES Software announces the release of version 2.0 of AES Password Manager, an advanced password management solution for both home and office users. AES Password Manager …
Cyberfraudsters detained in Spain
A large group involved in cybercrime and online fraud has been dismantled in Spain by the National Police last week. The authorities detained a total of 23 people all across …
Using Pict Encrypt for steganography purposes on Mac OS X
Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. Pict Encrypt …
Trojan bot exploits windows vulnerability, drops rootkit
A network creeping Trojan itself is insidious in nature and what if it uses a Rootkit to evade detection as well? Security Experts at MicroWorld Technologies inform that a …
Weekly Report on Viruses and Intruders – BarcPhish phishing attack, the Spamta.X and Microsoft vulnerabilities
This week’s report from Panda Software looks at the BarcPhish phishing attack, the Spamta.X worm and the MS06-052, MS06-053 and MS06-054 vulnerabilities affecting some …
SMobile unveils new version of mobile security product suite
SMobile Systems, delivering the industry’s only comprehensive, cross-platform mobile security solution for wireless carriers and device manufacturers, has unveiled a …
Featured news
Resources
Don't miss
- Attackers target retailers’ gift card systems using cloud-only techniques
- Attackers turn trusted OAuth apps into cloud backdoors
- Life, death, and online identity: What happens to your online accounts after death?
- OpenFGA: The open-source engine redefining access control
- For blind people, staying safe online means working around the tools designed to help