Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Trend Micro’s protection for virtual machines

Trend Micro is expanding its virtualization security portfolio with a content security solution to protect VMware ESX/ESXi environments. Core Protection for Virtual Machines …

Firewall management app turns firewalls back into network security devices

Pressures to keep network traffic flowing through firewalls combined with fear and anxiety over causing interruptions to business processes has created a situation where …

Criminals use enterprise strategies to conduct attacks

Cisco released their 2009 Midyear Security Report, which shows that Internet criminals are increasingly operating like successful businesses, borrowing some of the best …

Microsoft releases 6 security updates

Another Patch Tuesday and Microsoft comes out with security updates for ActiveX, DirectX, ISA Server 2006, Office Publisher, Virtual PC, Virtual Server and Windows. Two of the …

Cyberduck 3.2.1 released

Cyberduck, the FTP, SFTP, WebDAV, cloud files and Amazon S3 browser for Mac OS X, has reached version 3.2.1. The changes in the release include: Create placeholder objects for …

Memo to CIOs: Your next security crisis may have nothing to do with cyber attacks

I must admit I’m as much to blame here as anyone. After all, I’m the head of a company that prides itself on offering security appliances that will halt any …

Video: June 2009 threat webscape

June was a huge month for malicious email campaigns. There was a big rise in the volume of malicious messages sent, and many companies were hit by spear phishing campaigns. …

SmartWorkflow: New security management software blade

Check Point announced SmartWorkflow, a new security management software blade that provides customers the option of extending their security infrastructure with policy change …

New book: “Web 2.0 Architectures”

Web 2.0 is more pervasive than ever, but business analysts and technologists are still struggling to comprehend what it can offer them. So what exactly is it–a marketing …

New Trojan variants evade major anti-virus engines

Millions of e-mail viruses bypassed major anti-virus engines during the second half of the second quarter, according to the Q2 2009 Internet Threats Trend Report by Commtouch. …

Spam now represents 90 percent of inbound email

Marshal8e6 released its bi-annual TRACElabs report detailing the latest spam and exploit levels. From January to June 2009, they observed a staggering 60 percent increase in …

Vulnerability in Microsoft Office Web Components

Microsoft is investigating a vulnerability in Microsoft Office Web Components. An attacker who successfully exploited this vulnerability could gain the same user rights as the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools