Help Net Security
Growing dangers of digital music and movies
A growing number of cyber threats are associated with the popularity of online music and videos, according to a McAfee report. Researchers found that adding the word …
Debunking the email privacy myth
Email communications are inherently risky, and information transmitted by email, including sensitive data and business-critical transactions, is more vulnerable than most …
Remote monitoring software for BlackBerry
SpectorSoft released eBlaster Mobile, remote monitoring and surveillance software. eBlaster Mobile allows you to remotely monitor the activity of anyone using a BlackBerry …
Samba 3.5.5 security release
Samba is the standard Windows interoperability suite of programs for Linux and Unix. Samba 3.5.5 is a security release in order to address CVE-2010-3069. All Samba versions …
Variable speed encryption appliances
CipherOptics a new line of Variable Speed Encryption (VSE) appliances. While traditional encryption appliances are based on a static throughput, the new VSE line of network …
Global botnet offering DDoS services
Damballa discovered a botnet that offers pay-for-delivery DDoS attacks. The IMDDOS botnet, named after the commercial name on the botnet website, has grown to be one of the …
ESET Cybersecurity for Mac
ESET Cybersecurity for Mac is a new security solution that delivers protection against internet security threats without impacting system performance. Users get both Internet …
Cloud computing trust-based security
Trusted Computing Group, which develops industry standards for hardware-based security rooted in trust, announced an effort to extend the concept of trust to cloud-based …
“Here you have” virus authors may be based in Spain
The “Here you have” virus, which first appeared about a month ago, is a worm that has spread widely via email using social engineering (the name of the virus stems …
New data security software from IBM
Today, organizations are struggling to manage a variety of complex data security threats, from misuse by insiders or cyber criminals outside the company. Combined with an …
How CIOs can get things done with their reduced staff
It seems to me that we’re seeing more and more news of late about the lackluster job outlook. Unemployment will continue to be higher than originally forecasted and …
HP to acquire ArcSight
HP and ArcSight have signed a definitive agreement for HP to acquire ArcSight, a security and compliance management company, for $43.50 per share, or an enterprise value of …
Featured news
Resources
Don't miss
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity