Help Net Security
Sophos assists computer crime unit in a botnet master case
Sophos assisted the Metropolitan Police Computer Crime Unit in bringing a case against Robert Matthew Bentley. The hacker, of Panama City, Florida, who went by the alias …
Virtual worlds face malware reality check
Gaming industry is consistently stripped of its virtual assets as cyber-crooks continue to exploit gamers in pursuit of financial gain. Virtual worlds can provide an exciting …
Explaining non-delivery report type of spam
Research shows that up to 90% of emails received by companies are spam, and spammers have adopted a variety of methods to bypass spam filters used in anti-spam software. In …
PCI Compliance Explained
Learn about the Payment Card Industry Data Security Standard (PCI DSS), a security standard that includes requirements for security management, policies, procedures, network …
When it comes to data security breaches, the general public doesn’t need to know
When it comes to data security breaches, 78 percent of US IT decision-makers feel that companies do not need to inform the general public; this according to a recent survey by …
Best of Open Source Security Conference announced
Sourcefire announced the launch of the Best of Open Source Security (BOSS) Conference. Scheduled to run concurrently with Sourcefire’s annual customer summit, the BOSS …
Cross platform data security for Windows Vista, XP & Mac OS X
GT Security launched SecuriKey v3.0, providing full support for Windows Vista, Windows XP, Mac OS X Leopard and Mac OS X Tiger. Designed to keep mobile data safe, SecuriKey …
Free e-book: “Scared Safe: Life’s Little Identity Theft Prevention Handbook”
E-Book entitled “SCARED SAFE: Life’s Little Identity Theft Prevention Handbook” by Todd Feinman, is available for free download beginning today for anyone …
New solution for protecting wireless devices from data loss
Based on the successful Computrace desktop and laptop management solution from Absolute, new Computrace Mobile is the only solution on the market for the management of all …
Storm and the future of social engineering
In 2007, Storm burst onto the scene and spread rapidly. A new form of malware that propagated using a combination of email and websites, it proved extraordinarily …
Critical vulnerability in Citect’s SCADA software
Core Security Technologies issued an advisory disclosing a vulnerability that could severely impact organizations relying on Citect’s flagship industrial process control …
Plug-and-play NAC appliance from Mirage Networks
Mirage Networks introduced a new appliance, the MAX-500, that brings complete NAC coverage in the form of a plug-and-play appliance. The new platform offers all components of …
Featured news
Resources
Don't miss
- Attackers are targeting CrushFTP vulnerability with public PoC (CVE-2025-2825)
- Building a reasonable cyber defense program
- Attackers are probing Palo Alto Networks GlobalProtect portals
- Why global tensions are a cybersecurity problem for every business
- How to build an effective cybersecurity simulation