Help Net Security
New anti-analysis technique for script malware
Jonathan San Jose wrote an interesting blog post on new anti-analysis technique found in a malware object: Recently, we came across JS_VIRTOOL which uses certain Javascript …
Internet security expert Rod Beckstrom named as the ICANN CEO
Internet founders and leaders are joining industry executives and government officials in praising the selection of Rod Beckstrom as the new Chief Executive Officer and …
Scare tactics malware
Red Condor recently detected and blocked a new email virus campaign designed to scare email users with bogus legal action for activities, including illegal music downloads. …
The evolution of Qualys
Qualys CEO Philippe Courtot discusses the evolution of Qualys, from the early days to current projects and future ideas.
Monitor and maintain enterprise content governance
Vamosa unveiled Check & Fix, the first web site content monitoring service that checks and automatically fixes errors. It addresses key compliance issues faced by …
Spammers want to profit on Michael Jackson’s death
Sophos is warning users to be wary of spam messages using the untimely death of music legend Michael Jackson to harvest unsuspecting computer users’ email addresses for …
Simple steps to keep your identity safe online
June is Internet Safety Month, and simple identity theft protection steps such as shredding your mail and keeping careful tabs on your bank accounts and credit cards are …
Survey: 40% expect IT budgets to stay the same in 2009
According to Arrow Enterprise Computing Solutions’ second-annual survey, 40 percent of respondents indicated that they expect their IT budgets to stay the same in 2009. …
New virtual appliances enhancing protection for physical and virtual environments
Sourcefire announced the Sourcefire 3D System 4.9, with the new Sourcefire Virtual 3D Sensor and Sourcefire Virtual Defense Center. These new virtual appliances will enable …
New Seagate FreeAgent for Mac storage solutions
Delivering on the specialized requirements of the Mac community, Seagate introduced a line-up of mobile and desktop FreeAgent for Mac storage solutions and accessories: the …
Virtualization can play major role in disaster recovery
A large majority of IT executives say virtualization technologies can play a major role in a disaster recovery plan – but these technologies are not a complete solution, …
IBM researcher solves longstanding cryptographic challenge
An IBM researcher has solved a thorny mathematical problem that has confounded scientists since the invention of public-key encryption several decades ago. The breakthrough, …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics