Help Net Security
Firewall management app turns firewalls back into network security devices
Pressures to keep network traffic flowing through firewalls combined with fear and anxiety over causing interruptions to business processes has created a situation where …
Criminals use enterprise strategies to conduct attacks
Cisco released their 2009 Midyear Security Report, which shows that Internet criminals are increasingly operating like successful businesses, borrowing some of the best …
Microsoft releases 6 security updates
Another Patch Tuesday and Microsoft comes out with security updates for ActiveX, DirectX, ISA Server 2006, Office Publisher, Virtual PC, Virtual Server and Windows. Two of the …
Cyberduck 3.2.1 released
Cyberduck, the FTP, SFTP, WebDAV, cloud files and Amazon S3 browser for Mac OS X, has reached version 3.2.1. The changes in the release include: Create placeholder objects for …
Memo to CIOs: Your next security crisis may have nothing to do with cyber attacks
I must admit I’m as much to blame here as anyone. After all, I’m the head of a company that prides itself on offering security appliances that will halt any …
Video: June 2009 threat webscape
June was a huge month for malicious email campaigns. There was a big rise in the volume of malicious messages sent, and many companies were hit by spear phishing campaigns. …
SmartWorkflow: New security management software blade
Check Point announced SmartWorkflow, a new security management software blade that provides customers the option of extending their security infrastructure with policy change …
New book: “Web 2.0 Architectures”
Web 2.0 is more pervasive than ever, but business analysts and technologists are still struggling to comprehend what it can offer them. So what exactly is it–a marketing …
New Trojan variants evade major anti-virus engines
Millions of e-mail viruses bypassed major anti-virus engines during the second half of the second quarter, according to the Q2 2009 Internet Threats Trend Report by Commtouch. …
Spam now represents 90 percent of inbound email
Marshal8e6 released its bi-annual TRACElabs report detailing the latest spam and exploit levels. From January to June 2009, they observed a staggering 60 percent increase in …
Vulnerability in Microsoft Office Web Components
Microsoft is investigating a vulnerability in Microsoft Office Web Components. An attacker who successfully exploited this vulnerability could gain the same user rights as the …
The most physically and cryptographically secure USB flash drive
IronKey launched its S200 device for government and enterprise customers, featuring hardened physical security, the latest Cryptochip technology, active anti-malware and …
Featured news
Resources
Don't miss
- Social data puts user passwords at risk in unexpected ways
- New observational auditing framework takes aim at machine learning privacy leaks
- Why password management defines PCI DSS success
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance