Help Net Security
Network Access Control: Bridging the Network Security Gap
The business work place has evolved significantly over the last ten years. Back then, networks were far more simplistic; the internet was not a critical business tool, there …
Microsoft Internet Explorer least vulnerable browser in Q4
Cenzic released its Application Security Trend Report for Q4 2007. This report includes a consolidation of findings for all of 2007, along with the Top 10 Web application …
Top 10 vulnerabilities in Web Applications in Q4 2007
Open SSL Off-By-One Overflow – An off-by-one overflow is triggered by the SL_Get_Shared_Ciphers() function and can execute arbitrary code on the target system. Java Web …
Cybercriminals develop tools to test malware before distribution
According to PandaLabs, cyber-crooks are looking for ways to test their creations before distributing them. An investigation conducted by the malware analysis and detection …
Windows Server 2008 certification for Kaspersky Anti-Virus 6.0
Kaspersky Anti-Virus 6.0 for Windows Server Enterprise Edition earned a Windows Server 2008 software certification. Windows Server 2008 certification guarantees that Kaspersky …
Windows Server 2008 certification for GFI EventsManager 8
GFI Software announced that its award-winning events monitoring and events management solution GFI EventsManager 8 has achieved “Certified for Windows Server 2008′ …
Consumer attitudes toward internet security across Europe and North America
F-Secure today announced the results of its first annual Online Wellbeing Survey. This third-party survey of Internet users aged 20-40 in the US, Canada, the UK, France and …
Hardware security modules for Windows Server 2008
Hardware security modules play a vital role in providing incremental security capabilities for business applications. In many industries the use of HSMs is either specifically …
Foundstone services to focus on virtualization security
McAfee, Inc. unveiled the industry’s first service designed to help organizations securely deploy virtualization technologies. As part of its strategy to provide the …
New AVG Internet Security 8.0
AVG Technologies released AVG Internet Security 8.0, the latest version of its flagship suite for consumers and SMBs. The product delivers a significant number of new benefits …
Trend Micro acquires Identum for identity-based email encryption
Trend Micro announced today the acquisition of UK-based Identum, a developer of email encryption technology, as well as the world’s first fourth generation cryptography …
EnCase to further address Government cyber security challenges
Guidance Software announced new capabilities that allow federal agencies to identify, assess and remediate policy violations and vulnerabilities across the network. These …
Featured news
Resources
Don't miss
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats
- Fleet: Open-source platform for IT and security teams
- CERT-UA warns against “security audit” requests via AnyDesk