Help Net Security
Second beta edition of AVG 8.0 out for testing
GRISOFT, developer of the AVG family of security software products, today released the second beta edition of AVG 8.O for Windows for public testing. AVG 8.0 offers a …
Shifts in malware trends since 1986
Most of today’s Internet criminals are operating from Russia, China and Southern America. Over the next five years, there will be a significant increase in attacks from …
Shifts in malware trends since 1986
Most of today’s Internet criminals are operating from Russia, China and Southern America. Over the next five years, there will be a significant increase in attacks from …
What is a greynet?
Internet communications have evolved from point-to-point, asynchronous channels like email to real-time, presence-oriented communications like IM, P2P file sharing, Skype, and …
Programmer admits planting a “logic bomb”
A computer programmer hired by the St. Cloud Hospital to create a computer-based training program for hospital employees pleaded guilty today in St. Paul in connection with …
Three success stories of recovered stolen laptop computers
Absolute, the leading provider of firmware-based anti computer theft solutions announced that it has reached a milestone of 5,000 computer recoveries on behalf of its …
New book – Hacking: The Art of Exploitation, Second Edition
In this all-new, expanded, second edition of Hacking: The Art of Exploitation, author Jon Erickson again peels back the skin of arcane exploits to explain what happens in the …
Malware findings 2007: Social networking security concerns
According to FaceTime Security Labs, the increasing threat over this past year has been the boldness of a growing underclass of glory hackers on social networking sites such …
10,000 US Websites infected with crimeware toolkit
Finjan has identified significant new web attack – the latest in a genre of crimeware that threatens to turn highly trusted web sites into insidious traps for unwary …
5 VoIP threat predictions for 2008
Sipera VIPER Lab today revealed its Top 5 VoIP Threat Predictions for 2008. As with its “Top 5 VoIP Vulnerabilities in 2007” list, the Sipera VIPER team leveraged …
USB encryption product news #2: SafeHouse 3.0
PC Dynamics announced the release of its new SafeHouse 3.0 data privacy and encryption software with dozens of new features including greatly-enhanced support for USB memory …
USB encryption product news #1: KeyPoint Solo Vault
RedCannon Security announced the RedCannon KeyPoint Solo Vault, a software solution to protect sensitive data stored on USB devices. RedCannon KeyPoint Solo Vault provides …
Featured news
Resources
Don't miss
- CERT-UA warns against “security audit” requests via AnyDesk
- Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?
- AI-driven insights transform security preparedness and recovery
- NDR’s role in a modern cybersecurity stack
- How Russian hackers went after NGOs’ WhatsApp accounts