Help Net Security
Trojans accounted for 54.4 percent of the new malware detected in Q2 2006
Over fifty-four percent of the new malware detected by PandaLabs in the second quarter of 2006 were Trojans. This data shows an increase compared to the previous quarter, when …
Acunetix Web Vulnerability Scanner version 4 released
Acunetix today announced the release of Acunetix Web Vulnerability Scanner version 4. This latest version provides a more comprehensive solution for enterprises wanting to …
Global threat report on Web filtering, spyware and viruses
ScanSafe has released its latest Global Threat Report on Web filtering, spyware and viruses. The report is based on real-time analysis of more than five billion Web requests …
Vladimir Putin death spam spreads a trojan horse
IT security firm Sophos has warned of a spam campaign that poses as a breaking news report about the death of Russian President, Vladimir Putin, but is actually an attempt by …
Widespread Gmail phishing email lures users with cash prize
IT security firm Sophos has warned of a widespread phishing email campaign that tries to trick users out of money by pretending to be a cash prize from Gmail, Google’s …
World’s smallest secure USB flash disk introduced
Netac Technology Co Ltd, the company that invented the USB flash memory drive, has introduced the world’s smallest USB flash disk with built-in security. Weighing just …
Aurora Password Manager 1.5 released
Animabilis Software announced the release of version 1.5 of Aurora Password Manager. This password management solution functions as a single protected storage for all your …
Secure Computing to acquire CipherTrust
Secure Computing Corporation today announced that it has signed a definitive agreement to acquire CipherTrust, Inc., the global leader in messaging security. CipherTrust, a …
Microsoft Patches Seven Vulnerabilities
Microsoft alerted us this time about seven vulnerabilities of which five were rated critical and two important. There are vulnerabilities in the Server service, the DHCP …
Insidious network worm threatens enterprise security
If you are used to sharing data over the Internet or your enterprise’s intranet, apply caution. A network worm that will eventually bring in dangerous Trojans to your …
Successful Backups Are Not Enough
Overview Data protection requirements have moved on from the purely technical question of “Did the backup work?” to the much more complex question of “Is my …
LINX members unite in the war against spam
At the recent London Internet Exchange (LINX) AGM, the 200 strong membership agreed operational principles for spam management teams to share information while ensuring that …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems