Help Net Security
How to Start Up a Mobile Security Project
The proliferation of laptops, PDAs, smartphones and USB sticks means that corporate data is no longer confined to the office. Without a joined-up policy on mobile security, …
Up to one in 600 social-networking pages host malware
ScanSafe has released its latest Global Threat Report on Web filtering, spyware and viruses According to an analysis of more than five billion Web requests in July, ScanSafe …
Warning of a serious BlackBerry security threat
Secure Computing Corporation warn that organizations that have installed their BlackBerry server behind their gateway security devices could be subject to a hacking attack …
DesktopSecure for Linux for Ubuntu 6.06 LTS available
Following the launch of Ubuntu 6.06 LTS earlier this month, Canonical made Panda Software DesktopSecure for Linux available to all users of Ubuntu 6.06. Combining the security …
Microsoft patches 9 critical vulnerabilities
Microsoft alerted us this time about 12 vulnerabilities of which nine were rated critical and three important. There are vulnerabilities in the Server service, the DNS …
The Cult of the Dead Cow starts community based web application for malware analysis
The Cult of the Dead Cow (cDc), a prominent technology activist group, announced a new application designed to collect, analyze, and ultimately help defeat malicious software. …
Majority of workers ignore the risks of web links and attachments in emails
A survey into the habits of 142 UK office workers conducted by Finjan, the global provider of best-of-breed proactive web security solutions, has uncovered that although they …
Latest email scam offers JFK assassination secrets for sale
IT security firm Sophos has warned computer users to be wary of an email claiming to come from a dying KGB agent, offering to pass on secrets of the John F Kennedy …
New identity theft and online fraud techniques
Authors of computer viruses and threats -including phishing scams- are looking for direct financial profit from cybercrime. For this reason, they are using more innovative and …
10 Tips for Reducing Storage TCO
Relying on big vendors to design and implement your storage systems is often considered a safe approach. However, it allows vendors to take control over your storage systems …
Two-factor authentication solution for OpenVMS systems
Process Software announced that it has achieved technical interoperability certification between the VMS Authentication Module and RSA SecurID two-factor authentication …
SECUDE secure notebook with additional functionality
SECUDE secure notebook 7.2 – the latest version of its popular security solution, with an extended range of features for greater all round security. SECUDE secure …
Featured news
Resources
Don't miss
- Attackers target retailers’ gift card systems using cloud-only techniques
- Attackers turn trusted OAuth apps into cloud backdoors
- Life, death, and online identity: What happens to your online accounts after death?
- OpenFGA: The open-source engine redefining access control
- For blind people, staying safe online means working around the tools designed to help