Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Manage e-mail with ArcMail Defender U3160

ArcMail Technology announced the release of ArcMail Defender U3160, a stand-alone network appliance offering 16 TB of storage and data integrity technology. The ArcMail …

Phishing attacks down in May

The percentage of phishing attacks decreased in May relative to other malware, according to threat statistics analysed by managed security company, Network Box.  Phishing …

22 suspected computer hackers arrested in France

According to French media reports, the 22 alleged hackers were arrested in Paris, southern and central France following a four month investigation involving over 90 members of …

Malware report: AdvancedXPFixer adware and Tixcet worm

PandaLabs reports this week about the adware AdvancedXPFixer, the Banbra.FTI Trojan and the Tixcet.A worm. AdvancedXPFixer is adware (a program designed to display adverts) …

The critical importance of Enterprise Rights Management

Anyone wondering why Enterprise Rights Management (ERM) is growing in importance need only review the news stories of the past few years. A US government consultant accesses …

Internet scheme used to steal micro-deposits

Michael Largent, 22, was arraigned on an indictment charging him with multiple counts of computer fraud, wire fraud, and mail fraud. This case is the product of an extensive …

Hardware encryption-secured flash drive

EDGE Tech Corp introduced its rough-and-tough, hardware encryption-secured flash drive, the DiskGO Secure GUARDIAN. Utilizing mandatory 256-bit AES hardware encryption, the …

Apple updates security with Mac OS X 10.5.3

The Mac OS X 10.5.3 Update is recommended for Mac OS X 10.5, 10.5.1, and 10.5.2 Leopard. It includes general operating system improvements that enhance the stability, …

Adobe Flash Player remote code execution vulnerability roundup – update #2

Adobe Flash Player contains an code execution vulnerability. An attacker may be able to trigger this overflow by convincing a user to open a specially crafted SWF file. The …

HNS Book giveaway: “The Future of Reputation: Gossip, Rumor, and Privacy on the Internet”

June 05 2008: The winner is Jeffry B. ———————————- We are giving one of our readers a copy of “The …

Insider threats keep IT directors awake at night

Secure Computing announced the results of an IT Director survey that uncovers a rising concern of insider threats and widespread acknowledgement of being unprepared for …

Preparations for secure collaboration in a de-perimeterized business world

Jericho Forum released the results of a spot survey of 22 IT security vendors that responded to questions about vendor preparedness to deliver security for today’s …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools