Help Net Security
First dual biometric reader
ZK Software ntroduced the world’s first dual biometric reader. Just the touch of a finger, a one second facial scan or flash of an ID card is all it takes for the iFace …
Checklist to accelerate your software security efforts
In recent years, Software-as-a-Service (SaaS) has emerged as a viable application delivery method, and most enterprises are now including some SaaS software in their …
Symantec web security monitoring against pervasive threats
Symantec announced Web Security Monitoring, a new managed security service which monitors organizations’ proxy and gateway security devices for connections from hosts …
Turning point for security decision making
According to IBM and The Ponemon Institute research, 77 percent of C-level executives report that their organization has experienced a data breach at some point, while all …
The Conficker conundrum
Security experts estimate that Conficker, a particularly malicious worm, targeting MS Windows, has already infected more than 7 million computers around the world. Conficker …
Tax season: Identity thief’s paradise
Many consumers look forward to tax season in anticipation of a hefty return. In the same instance, many identity thieves look forward to tax season as well, only in …
Rogue software details: Coreguard Antivirus 2009
Coreguard Antivirus 2009 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Brazil tops global spam rankings
Brazil, India, Vietnam, USA and Russia head the ranking of countries from which most spam was sent during the first two months of the year, according to a study by Panda …
Best practices for web services interoperability
The Web Services Interoperability Organization (WS-I) announced the publication of the WS-I Basic Security Profile (BSP) 1.1 as final material for public access. WS-I is an …
AVG Rescue CD: Free toolset for repair of infected machines
The AVG Rescue CD is essentially a portable version of AVG Anti-Virus supplied through Linux distribution. It can be used in the form of a bootable CD or bootable USB flash …
Cloud computing: Risks outweigh the benefits
Research conducted across Europe, the Middle East and Africa (EMEA) by ISACA has found that a quarter of enterprises that already use cloud computing believe that the risks …
Rogue software details: PC Antispy
PC Antispy is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Featured news
Resources
Don't miss
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
- Why logs aren’t enough: Enhancing SIEM with AI-driven NDR