Help Net Security
Privileged Identity Management Suite against insider threats and data theft
Privileged Identity Management Suite against insider threats and data theft Cyber-Ark announced availability of its Privileged Identity Management Suite v5.0. The Suite is a …
SaaS tool combines anti-phishing and anti-malware capabilities
MarkMonitor announced AntiFraud Solutions, offering patented technology to enable brand owners to prevent, detect and respond to phishing and malware attacks. MarkMonitor …
Fingerprint sensor on the new Motion J3400 tablet PC
AuthenTec announced that its fingerprint sensor has been integrated into the new Motion Computing J3400 rugged tablet PC, offering Power of Touch features including security, …
New version of Blue Coat SGOS operating software
Blue Coat Systems announced version 5.4 of its SGOS operating software for its Blue Coat ProxySG appliance family. The new release is designed for fast installation for WAN …
Free security tool for Flash developers from HP
HP announced HP SWFScan, a free tool to help Flash developers protect their websites against unintended application security vulnerabilities and reduce the risk of attackers …
SEO techniques used to distribute rogue anti-virus software
Finjan’s Malicious Code Research Center (MCRC) managed to research one of the rogueware affiliate networks, where members make $10,800 a day. In the first issue of its …
Modular open source platform for creating network security tools
Netifera is a new modular open source platform for creating network security tools. This project provides many advantages for both security developers and researchers who want …
Record numbers of crimeware besiege desktops
The APWG, the global independent coalition combating electronic crime, reported that rates of crimeware-spreading sites and rogue anti-malware programs used for a number of …
New book: “97 Things Every Software Architect Should Know”
Software architects occupy a unique space in the world of IT. They are expected to know the technologies and software platforms on which their organizations run as well as the …
The Interceptor: a free network tap
The Interceptor is a wired network tap which passes network data out over a wireless network so it can be sniffed on a network device on a remote machine. First the the two …
Top 5 pitfalls for securing retail cardholder data
Recognizing the need for stronger protection against security threats, the Payment Card Industry (PCI), a consortium of retail and credit card leaders, published Data Security …
Advances in biometrics remedy the need for increased security
Security concerns in the present world continue to grow in intensity and complexity. This opens the door to many opportunities within the European biometrics market, which is …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics