Help Net Security
Rogue software details: QuickHealCleaner
QuickHealCleaner is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Ubuntu Privacy Remix 9.04r3 released
Ubuntu Privacy Remix is a modified Live-CD based on Ubuntu Linux. UPR is not intended for permanent installation on hard disk. The goal of Ubuntu Privacy Remix is to provide …
A closer look at CA Internet Security Suite Plus 2010
CA ISS Plus 2010 provides protection against viruses, spyware, hackers, spam, phishing and offensive websites (with Parental Controls). There is also a backup option …
Netgear releases 3G/4G/WiMAX wireless routers
Netgear announced two full-featured new routers for connecting to 3G/4G/WiMAX cellular networks. The 3G/4G Mobile Broadband Wireless-N Router (MBRN3000) combines 802.11n …
Online fraud: Avoiding the seven deadly sins
By using the points below, companies transacting online can reduce the threat of fraudulent purchases or unauthorized account access and ensure a safer experience for their …
New books: The Sustainable Network, iPhone SDK Development, VMware Cookbook
What technologies do we need to solve the complex environmental, economic, social, and political challenges facing us today? This book by Sarah Sorenson reveals that one tool …
Cyber-liability: Importance and complexity
When the U.S. Supreme Court agreed to take the case of a California police officer who sent sexually explicit text messages on a department-issued pager, news reports …
Mac video surveillance
SecuritySpy is a multi-camera video surveillance application for the Mac. It will enable you to set up a comprehensive surveillance system quickly. The motion detection …
How to prevent identity theft
Identity thieves use low-tech methods (stealing your wallet or even eavesdropping at key moments) as well as sophisticated Internet scams to rob people of their sensitive …
Rogue software details: XPPoliceAntivirus
XPPoliceAntivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\XP …
Modification risks from portable devices
Software crackers are likely to continue modifying relatively low-cost specific-application devices, such as e-readers, but that the potential security risks to companies are …
Splunk 4.0.8 released
Splunk released version 4.0.8 of the Splunk IT search and analysis engine. General issues When you save a top or rare search with the argument showperc, the showperc argument …
Featured news
Resources
Don't miss
- Why we must go beyond tooling and CVEs to illuminate security blind spots
- Making security and development co-owners of DevSecOps
- Review: Passwork 7.0, self-hosted password manager for business
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade