Help Net Security
Free Anti-Virus solution from Comodo
Comodo announced the availability of Comodo Anti-Virus V1.0 The software provides one of the highest levels of protection and control against known and emerging threats with …
ISS warns against potential Microsoft Exchange worm
Internet Security Systems, Inc. cautions computer users that a vulnerability announced today in the Microsoft Exchange calendar feature could lead to a worm. ISS is providing …
Fantasy Football Formula Virus Spreads Via Excel Spreadsheets
Experts at SophosLabs, Sophos’s global network of virus, spyware and spam analysis centres, have warned users about a new virus that infects Excel files under the …
Test and Crash Beta Version of BitDefender 10 Internet Security
BitDefender is inviting the public to take their best shot at testing and crashing BitDefender 10 Internet Security Beta, the company’s upcoming flagship suite of …
How Companies Can Manage Strong Authentication Intelligently
According to the latest figures from the Department of Trade & Industry, eight out of ten UK firms offer its employees the option of working from home for at least part …
Weekly Report on Viruses and Intruders – Nugache.A Worm, Hiviti.A and Banker.CTD Trojans
A worm, Nugache.A, the backdoor Trojan Hiviti.A and the Banker.CTD Trojan are the focus of this week’s PandaLabs report. Nugache.A can spread in three different ways: …
Cross-Site Scripting Worms and Viruses: The Impending Threat and the Best Defense
On October 4, 2005, the “Samy Worm1” became the first major worm to use Cross-Site Scripting2 (“XSS”) for infection propagation. Overnight, the worm …
Biggest X Window security hole since 2000
Coverity, Inc. announced that as a result of their contract with US Department of Homeland Security (DHS), the biggest X Window System security vulnerability of the last six …
SurfControl: Key trends for spam in first quarter 2006
Using SurfControl’s Adaptive Threat Intelligence (ATI), SurfControl’s Global Threat Experts have compiled threat trend data for the first quarter of 2006.In the …
BitDefender Launches Next Generation of Heuristic Detection
BitDefender announced B-HAVE (Behavioral Heuristic Analyzer in Virtual Environments), its next generation of heuristic detection technology, will be included in all future …
WOW Password Stealing Trojan Targets Online Gamers
Security Analysts at MicroWorld Technologies inform that a new variant of the password stealing Trojan named “Trojan-PSW.Win32.WOW.x’ is spreading fast, attacking …
Identity Theft – Should You Be Worried?
Pick up any magazine or newspaper, surf to any Internet technology or news site, turn on the TV and listen to the news and it becomes apparent that identity theft is a major …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!