Help Net Security
Rogue software details: SecurityCentral
SecurityCentral is a rogue security application. In order to remove it, find out what files and registry entries to look for below. SecurityCentral will prevent execution of …
Adobe patches Flash Media Server
Critical vulnerabilities have been identified in Adobe Flash Media Server (FMS) 3.5.2 and earlier versions. The vulnerabilities could allow an attacker, who successfully …
Intel patches flaws in its Trusted Execution Technology
Invisible Things Lab – who specialize in system-level security – issued yesterday the results of their research in which they describe how flaws in Intel’s …
Tripwire’s top 5 IT security predictions for 2010
With increasingly stringent compliance mandates, the explosion in virtualization interest and adoption, demands for audit reporting, and a spike in security breaches, 2009 has …
7 smartphone security tips
Lookout, a mobile security startup, suggests seven tips to staying safe on your smartphone. Whether you use your smartphone for business or pleasure, securing the computer in …
iPhone security software: Keeper Password & Data Vault
Keeper is yet another password management system for the iPhone platform. I tested the 3.2 version, released in late September 2009. The application requires around 5.4 MB for …
Microsoft Security Update Guide
The Microsoft Security Update Guide was designed to help IT professionals better understand and use Microsoft security release information, processes, communications, and …
Looking back at malware in 2009
2009 was the year in which nobody that uses the Internet could afford not to educate him/herself about the dangers that lurk in the inbox, in Google’s search results, on …
Rogue software details: TheDefend
TheDefend is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
2010 cyberthreat forecast: Attack vectors
2009 was dominated by sophisticated malicious programs with rootkit functionality, Conficker, web attacks and botnets, SMS fraud and attacks on social networks. With the start …
New books: Windows 7, Programming #F
With Windows 7: The Definitive Guide you will learn how to squeeze every bit of power out of Windows 7 to take full advantage of its features and programs. You will learn how …
Week in review: Migrating to Windows 7, VoIP vulnerability trends and online safety guide
Here’s an overview of some of last week’s most interesting news, interviews and articles: Serious SQL flaw could have compromised millions of Rockyou.com users The …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits