Help Net Security
Rogue software details: Digital Protection
Digital Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Introduction to malware analysis
In this video, Lenny Zeltser will introduce you to the process of reverse-engineering malicious software. He will outline behavioral and code analysis phases, to make this …
In the security of mobile devices we trust, say users
The majority of mobile device users worldwide feel safe using their mobile devices for applications, including access online banking, according to research by Unisys. The …
GFI LANguard learning videos
GFI LANguard: Software Replacement In this video you see three tips on using GFI LANguard to replace an old piece of software, with a new application. GFI LANguard: Deploy GFI …
Entrust brings strong authentication to mobile devices
With the newest release of Entrust IdentityGuard, Entrust will add the innovative Entrust IdentityGuard Mobile application, which seamlessly authenticates consumer, corporate …
The US continues its reign as the king of spam
The United States continues its reign as the king of spam, relaying more than 13% of global spam, accounting for hundreds of millions of junk messages every day, according to …
Perception of data security at odds with reality
Nearly three-quarters of organizations believe they have adequate policies in place to protect sensitive, personal information, yet more than half have lost sensitive data …
Secure USB flash drive with on-board PIN pad
The LOK-IT is a USB flash drive with a hardware-based security system that requires users to log in on a self-contained, on-board PIN pad. The PIN pad is not connected to the …
Lansweeper 4.0: Network inventory tracking
Lansweeper 4.0 is a Windows network inventory application that will allow yo to do a complete inventory of your Windows network without the need to install an agent on all …
Government-grade voice security for BlackBerry
Cellcrypt released its high-strength government-grade encryption application for mobile devices, including BlackBerry smartphones, on both T-Mobile’s secure cellular …
nShield Edge: USB-attached hardware security module
Thales released nShield Edge, the world’s first FIPS 140-2 Level 3 validated USB-attached hardware security module (HSM). It features an integrated card reader and …
Rogue software details: PC-Guide
PC-Guide is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Featured news
Resources
Don't miss
- Crypto-stealing iOS, Android malware found on App Store, Google Play
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer