Help Net Security
Check Point extends 3D security with Dynasec acquisition
Check Point announced the acquisition of privately held Dynasec, a provider of Governance, Risk Management and Compliance (GRC) solutions. The acquisition extends Check Point …
Network and security analysis with Trisul
Trisul is a new kind of network monitor that supplements fine grained traffic metering with flows, packets, and alerts. You can carry out any kind of network and security …
eFront multiple vulnerabilities
Multiple vulnerabilities have been reported in eFront, according to Secunia. These can be exploited by malicious users to conduct SQL injection attacks and compromise a …
Irresponsible IT disposal methods
Although data security is the primary concern when decommissioning IT equipment, only 61 per cent of companies currently data wipe all of their redundant computers, according …
ICSA Labs tests products against larger malware set
ICSA Labs, an independent division of Verizon, is now testing products in its Anti-Virus program against virus samples from not only the WildList (a database of real-world …
How does GFI LanGuard help network administrators?
Managing an IT network that is continuously changing and growing is not a trivial task. Once the network comprises more than a handful of machines, it becomes a …
Week in review: U.S. government satellites hacked, Halloween threats and the m00p gang investigation
Here’s an overview of some of last week’s most interesting new, podcasts and articles: Microsoft puts vulnerability exploitation into context Recently Microsoft …
Duqu not developed by Stuxnet author
The Dell SecureWorks Counter Threat Unit (CTU) research team has been analyzing the Duqu trojan which received a great deal of attention because it is similar to the infamous …
Combating Halloween malware threats
GFI Software released tips for spotting and combating malware attacks and threats in the run up to Halloween. Halloween has now become firmly established as a family event in …
Endpoint Protector 4 released
CoSoSys released a new version of their flagship device control and data loss prevention solution, Endpoint Protector. Offering enhanced protection, increased effectiveness …
National-scale iris and fingerprint identification
Neurotechnology announced MegaMatcher Accelerator 4.0, the latest update of the company’s multi-biometric software and hardware solution for high-volume, high-speed …
Android malware is stealing your data
The second half of 2011 has been an active one for cyber criminals, who have been increasingly looking for chances to set up new scams in the mobile device environment. …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)