Help Net Security
Finjan identifies critical Microsoft vulnerability
Finjan has informed Microsoft of a bypass and cross zone scripting vulnerability in the Remote Data Service (RDS) object. Attackers could have potentially exploited this …
SealedMedia Version 5.0 enterprise digital rights management platform released
SealedMedia Inc. today launched Version 5.0 of its flagship enterprise digital rights management (E-DRM) platform. The new release delivers unprecedented scalability, improved …
ISS announces Proventia Server for Linux
Internet Security Systems announced Linux support for its Proventia Server Intrusion Prevention System product line. Following on the heels of its Q4 2005 release of Proventia …
New Trojan Hijacks Your Internet Traffic
Security experts from MicroWorld Technologies inform that “Trojan-Clicker.Win32.Qhost.v’ is a new variant of the Trojan-Clicker series. This malware spreads via …
AEP Netilla Security Platform Release 5.2.2 SSL VPN now shipping
AEP Networks announced general availability of its latest SSL VPN platform. The AEP Netilla Security Platform (NSP) is now shipping with Release 5.2.2, a software enhancement …
Weekly Report on Viruses and Intruders – Current trend of Criminalization of Malware
This week’s report from Panda Software about viruses and intruders is a reflection of the current trend of criminalization of malware. The creators of malicious code, …
Test your computer online with Web Malware Scanner 2.0
The a-squared Web Malware Scanner 2.0 hunts spyware, trojans, worms, dialers, tracking cookies and it does all that from within the web browser. The software uses over 350,000 …
Phishers Are Improving Their Chances of Success with Targeted Attacks
Phishers are using a lesson learned from virus and worm writers to improve their chances of success. Over time virus and worm authors discovered that is was not necessarily …
Security problems in Cisco devices
Cisco has published two security advisories to warn of problems in several of its devices. Products affected are Cisco ONS 15000 Series Common Control Cards, Cisco Transport …
A straightforward guide to a complex topic: how to encrypt email with PGP or GPG
In today’s world of electronic eavesdropping and computer security breaches, who isn’t a little paranoid? The fact is, email isn’t private. Any number of …
Application falsely identifies security products as spyware
SurfControl announced that its Threat Analysts have identified a rogue anti-spyware application, UnSpyPC, which falsely identifies popular security products and well known …
Who Shall We Rob Today?
Remember those old black and white movies, the stocking masks, the pick axe handles, the sawn off shotguns and the white 2.8 Jaguar as the getaway car? Lots of action and …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems