Help Net Security
Rogue software details: TrustFighter
TrustFighter is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
VeriSign introduces new verification service for Web sites
VeriSign debuted the VeriSign Trust Seal, an extension of their recognized online trust mark, to increase confidence, traffic and transactions for sites that do not require …
Critical vulnerability in Adobe Download Manager patched
A critical vulnerability has been identified in the Adobe Download Manager. This vulnerability (CVE-2010-0189) could potentially allow an attacker to download and install …
Secretary of Homeland Security Janet Napolitano to keynote RSA Conference 2010
RSA Conference 2010 announced that Janet Napolitano, U.S. Secretary of Homeland Security, is scheduled to deliver a keynote on Wednesday, March 3, 2010 at 3:10 PM. Secretary …
First certified cloud-based solution for FDCC compliance
Qualys announced its new QualysGuard FDCC module – the first certified cloud-based computing solution for FDCC compliance. The module, validated by the National …
Rapid7 NeXpose now includes Exploit Exposure
Rapid7 announced Exploit Exposure, a new technology in its vulnerability management product, Rapid7 NeXpose. Exploit Exposure provides users with deeper insight into the …
What’s a rogue and why do you need to know?
You may not be familiar with the term rogue software but there’s a very good chance that you or someone you know either has experienced it, or will in the near future. …
Widespread data breaches uncovered by FTC probe
The Federal Trade Commission has notified almost 100 organizations that personal information, including sensitive data about customers and/or employees, has been shared from …
Undetected data breaches are the ones that hurt the most
File transfer technologies have been around for over 30 years, but recent evolutionary changes in business needs have resulted in significant improvements to file transfer …
Excalibur Conference 2010 call for papers
In autumn 2010, the Excalibur Conference in China, will feature talks but world-renowned security professionals that will address new areas of research. The event will cover …
Rogue software details: Desktop Security 2010
Desktop Security 2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
75% of organizations suffered a cyber attack
A new Symantec study found that 42 percent of organizations rate security their top issue. This isn’t a surprise, considering that 75 percent of organizations …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption