Help Net Security
F-Secure protects Android users
F-Secure released Anti-theft for Mobile and Mobile Security, which includes the Browsing Protection feature, for smartphones on the Android platform. Today’s smartphones …
Rogue software details: Security Essentials 2010
Security Essentials 2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Week in review: Aurora malware, cyber war games and 0-day vulnerabilities for sale
Here’s an overview of some of last week’s most interesting news and articles: Biggest Chinese hacker training site taken down Black Hawk Safety Net, which offered …
Rogue software details: MalwarePro
MalwarePro is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Google Buzz for spammers
The Google Buzz sign-up is being advertised to users when logging into Gmail, and is a fairly transparent process to users with an existing Gmail account. Clicking on …
Critical infrastructure is a primary cybercriminal target
Critical infrastructure such as energy, pharmaceutical and government assets are more than twice as likely to be targeted by cybercriminals than other organizations, according …
Security advice for Valentine’s Day
Malware that uses Valentine’s Day as a lure to trick users and infect computers is now a well-established feature of the IT security calendar. Once again, it will be no …
Rogue software details: Security Antivirus
Security Antivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Will virtualization and cloud computing change how we achieve security?
The virtues of virtualization and cloud computing will figure in most enterprise IT infrastructure discussions during 2010. Virtualization has already proven its worth in …
Rogue software details: Advanced Defender
Advanced Defender is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
VNC Viewer for iPhone and iPod touch
RealVNC has launched VNC Viewer, an iPhone and iPod touch application that allows you to connect to and take full control of a computer anywhere in the world. Available to …
The four myths of cyber security
Governments and corporations around the globe are facing a crisis in the form of cyber security threats. Incidents and exploits crafted by an effective and growing menace are …
Featured news
Resources
Don't miss
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
- Why logs aren’t enough: Enhancing SIEM with AI-driven NDR
- Aim for crypto-agility, prepare for the long haul