Help Net Security
Large mailing of PDF files exploits recent vulnerability
F-Secure has been monitoring a large mailing of malicious PDF files. These PDF files exploit a recent vulnerability. When such PDF files are viewed on vulnerable machines, …
Block Data Leakage at the Source
Computer networks today have become increasingly open, with greater reliance on IP. More and more staff are accessing a greater number of applications and databases, while …
Windows Mobile 6 storage card encryption solution
Sprite Mobile announced the launch of Sprite Backup 6.1, the newest edition of the award winning Microsoft Windows Mobile backup and recovery software. Sprite Backup 6.1 adds …
France, Spain and the USA have the highest rates of infected computers
France has been the country with the highest percentage of infected PCs this week, according to data from the Infected or Not website. Over 38% of protected computers (with an …
Data leak prevention expert to be acquired
Trend Micro announced today a definitive agreement to acquire Provilla, Inc., a leading provider of fingerprint-based intelligent endpoint solutions for data leak prevention …
Zombie Detection System with a free zombie test
PineApp has released a free zombie test that can instantly discover whether an organization’s computer network might be an unwitting spamming machine — a …
Malicious spam on the rise, PDF spam RIP
During August 2007 Sophos identified a series of large-scale malware attacks made via spam email, with weblinks inserted into spam messages that directed recipients to …
Corporate malware on the rise
The malware analysis and detection laboratory, PandaLabs, alerts that almost 72% percent of companies with more than 100 computers have active malware on their …
Theft and Snooping Alarm for Your MacBook
iAlertU is a simple utility that turns your MacBook into a motion sensitive remote controlled alarm system. I cannot think a lot of useful ways of using the software, but the …
Top spam-relaying countries – US leads the way
Sophos has published its latest report on the top twelve spam-relaying countries over the third quarter of 2007. Experts at SophosLabs scanned all spam messages received in …
Fight piracy with Automated Human Visual Verification
The Automated Human Visual Verification (AHVV) solution enables users to quickly scan thousands of potential copyright infringements each day, allowing the customers to …
A Security Focus on China Outsourcing
Business process outsourcing (BPO), such credit card transactions, medical claims data entry and financial transactions, has been around for a number of years. The act of …
Featured news
Resources
Don't miss
- CERT-UA warns against “security audit” requests via AnyDesk
- Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?
- AI-driven insights transform security preparedness and recovery
- NDR’s role in a modern cybersecurity stack
- How Russian hackers went after NGOs’ WhatsApp accounts