Help Net Security
Q&A: The DNSChanger Trojan
Christoph Alme is the Principal Engineer and Team Lead of anti-malware research at Secure Computing Corporation. He is the inventor of several patent-pending key technologies …
APSolute Immunity provides networks with ability to fight emerging threats
Radware introduced its APSolute Immunity security initiative, a new strategic approach that maintains business continuity by protecting the applications infrastructure against …
More malicious attacks on the Threat Horizon
The Information Security Forum (ISF) is warning of an increase in malicious threats including attacks from organised crime and industrial espionage, along with a rise in …
Malware growth at a higher level than ever before
In its 2008 first half data security summary, F-Secure reports malware growth rate at a higher level than ever before. This recent explosion of malware doesn’t …
New book: “Your Brain: The Missing Manual”
Your Brain: The Missing Manual is a practical look at how to get the most out of your brain — not just how the brain works, but how you can use it more effectively. What …
Multiple vulnerabilities in Ruby
Multiple vulnerabilities in Ruby may lead to a denial of service (DoS) condition or allow execution of arbitrary code. With the following vulnerabilities, an attacker can lead …
Research pinpoints how institutions should respond to data breaches
Javelin Strategy & Research announced today results from a new study covering data breach victims, which highlights the acute awareness among consumers about data …
Lack of visibility and control puts enterprise network resources at risk
Nearly 50% of enterprises believe employees and non-employees have access to data that is not relevant to their job function according to a recent survey the company …
New mobile antivirus and firewall solutions
Sybase iAnywhere today announced that it has expanded its mobile security portfolio to include handheld antivirus and firewall capabilities. Sybase Information Anywhere …
C2 Systems: No Longer a Proprietary Issue
The past five years have seen remarkable transformation in how military Command and Control (C2) systems are designed and procured. Proprietary and costly custom developed …
The demand for RFID and biometric security solutions
Government and security agencies worldwide increasingly demand high-tech solutions to secure their borders. In response, the security industry is developing technology that …
Shocking data privacy abuse by UK businesses
UK businesses are giving out highly personal and confidential details about their customers to third parties in a bid to boost sales reveals a new survey by StrongMail of 900 …
Featured news
Resources
Don't miss
- Critical Firefox, Tor Browser sandbox escape flaw fixed (CVE-2025-2857)
- Android financial threats: What businesses need to know to protect themselves and their customers
- Post-quantum cryptography and the future of online safety
- How to manage and protect your biometric data
- UK NCSC offers security guidance for domain and DNS registrars