Help Net Security
RSA offers complete threat management solution
RSA, the Security Division of EMC, announced a set of core technologies and services designed to help organizations more effectively manage information risk and IT compliance …
HID Global acquires ActivIdentity
HID Global announced that parent company ASSA ABLOY has entered into a definitive agreement to acquire ActivIdentity. ActivIdentity provides identity assurance solutions, …
Bugat Trojan linked to LinkedIn phishing campaign
Researchers have discovered a new version of the Bugat financial malware used to commit online fraud. Bugat was distributed in the recent phishing campaign targeting LinkedIn …
Four virtual appliances for cloud security
Fortinet announced four new virtual appliances that extend the company’s ability to deliver security across virtualized and cloud environments. The FortiGate, …
Social media sites and universities increasingly targeted by phishers
Social media sites and educational institutions were increasingly targeted by phishers who continued to expand the targets of their attacks in the first half of 2010. With …
Ubuntu 10.10 desktop, netbook and server editions released
Ubuntu 10.10, codenamed “Maverick Meerkat”, is now available for download. Ubuntu 10.10 introduces an array of online and offline applications to Ubuntu Desktop …
New film exploring online security
A new project called “The Gran’ Scam of Things” is in the works. The premise of the short film poses serious questions about online financial abuse by taking …
Week in review: The future of malware, iTunes phishing attack and computer “health certificates”
Here’s an overview of some of last week’s most interesting news, articles, reviews, interviews and podcasts: XSS flaws found on three security firms’ …
Free Stuxnet removal tool
BitDefender released a free removal tool targeting all known variants of the Stuxnet worm, as well as the rootkit drivers that are used to conceal critical components of the …
Operation Payback: Anonymous group causes service interruptions
The DDoS attacks organized by the Anonymous cyber-activist group against SGAE (Spanish copyright collection society), the Spanish Culture Ministry and Promusicae, which began …
A Guide to Kernel Exploitation
The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers …
The importance of e-mail security
E-mail is exposed at various points along its transmission, via backups, by IT staff members, or during firewall inspection. And not just the text: attachments account for …
Featured news
Resources
Don't miss
- Critical Veeam Backup & Replication RCE vulnerability fixed, patch ASAP! (CVE-2025-23120)
- RansomHub affiliate leverages multi-function Betruger backdoor
- Kali Linux 2025.1a drops with theme refresh, Kali NetHunter updates
- 5 pitfalls that can delay cyber incident response and recovery
- How healthcare CISOs can balance security and accessibility without compromising care