Help Net Security
Authentication management platform for any and every authentication factor
” border=”0″ align=”left” vspace=”5″ hspace=”5″>Hitachi ID Systems has released Password Manager 7.0, an authentication …
Google has two times more malware than Bing, Yahoo! and Twitter combined
Barracuda released its Barracuda Labs 2010 Midyear Security Report, revealing data from two key areas: search engine malware and Twitter use and crime rate. Searching for …
New assurance mark of software application security
Veracode unveiled the VERAFIED High Assurance mark of software application security for the CWE/SANS Top 25 Most Dangerous Software Errors. This industry “seal of …
Sourcefire’s open source framework for deep threat inspection
Sourcefire announced Razorback, an open source framework designed to deliver deep inspection capabilities for combating today’s most complex threats. Developed to help …
Critical ToolTalk Database Server Parser vulnerability discovered
Check Point announced that its IPS Research team has recently discovered a critical vulnerability in a function of the ToolTalk Database Server Parser that can enable a remote …
The cost of cyber crime
ArcSight and the Ponemon Institute announced the results of the First Annual Cost of Cyber Crime Study (registration required). Over a four-week period, the 45 organizations …
Secure cell phone conference calling
Cellcrypt announced that it has launched a secure conference service that provides both device authentication and voice call encryption to participants using popular cell …
Exploitability data from real-time feeds
Qualys announced that QualysGuard Vulnerability Management now includes correlated exploitability information from real-time feeds to provide customers with up-to-date …
P2P increasingly favored by malware attackers
Cisco released its 2Q10 Global Threat Report, which is an aggregation of data and insights on threats from Cisco Security Intelligence Operations. The report merges the most …
PC surveillance software for Terminal Servers
Refog announces the release of Refog Terminal Monitor, a centralized software-based employee tracking system for the Terminal Server allowing administrators to track employee …
The impact of structural vulnerabilities on enterprise websites
Dasient released a new research report, “Structural Vulnerabilities on Websites: Why Enterprise Websites Are Vulnerable to Malware Attacks,” which found that, …
Free tool to protect against Windows “.LNK” zero-day flaw
Sophos has released the Sophos Windows Shortcut Exploit Protection Tool, which protects against a vulnerability that allows malicious hackers to exploit a bug in the way that …
Featured news
Resources
Don't miss
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!
- Crypto-stealing iOS, Android malware found on App Store, Google Play