Help Net Security
Malware prevention for Skype
FaceTime Communications announced enhancements to its Greynet Enterprise Manager including detection of malicious URLs entering the enterprise network via Skype instant …
Howard A. Schmidt named (ISC)2 Security Strategist
(ISC)2 announced that information security industry veteran Prof. Howard A. Schmidt, CISSP, has been named (ISC)2 Security Strategist by the board of directors, a role that …
Red Hat Certificate System source code released
Red Hat has just released all of the source code to Red Hat Certificate System. Much of the technology in Red Hat Certificate System was already open source, including the …
Man admits to writing anime trojan horse
Masato Nakatsuji, the 24-year-old who in January became the first ever virus writer to be arrested in Japan, admitted in Kyoto District Court that he created a Trojan horse …
New Firewall Analyzer product suite
AlgoSec announced the availability of the AlgoSec Firewall Analyzer (AFA) product suite. The new suite, which improves the overall security and efficiency of enterprise …
New product: Sophos Endpoint Security and Control 8.0
Sophos announced Sophos Endpoint Security and Control 8.0, incorporating Network Access Control technology to go beyond reactive and proactive anti-virus – offering …
New version of BullGuard Backup
BullGuard released BullGuard Backup 8.0, the second version of its stand-alone backup offering. New features include improved encryption and compression options, a larger …
Identikey Server 3.0 – new authentication solution for large enterprises
VASCO Data Security International announced today that it launches its new authentication server, Identikey Server 3.0. This authentication solution, based on VACMAN’s …
Mac OS X Leopard Phrasebook
Mac OS X Leopard is the latest operating system from Apple that very quickly proved itself to be a great solution for a number of working environments. This book is aimed for …
Four key steps every company should take to protect its critical data
Ecora Software outlined a series of safeguards that companies should consider implementing in order to be protected from harm caused by unauthorized access to critical data. …
New versions of Veritas Storage Foundation and Cluster Server 5.1
Symantec announced Veritas Storage Foundation and Veritas Cluster Server 5.1 for Windows, the industry leading heterogeneous storage management and high availability solution …
Spammers are leveraging Google applications
BitDefender antispam analysts have detected that Nigerian scam spammers are using a new gateway to target the corporate world: Google Calendar. Nigerian scam spammers are …
Featured news
Resources
Don't miss
- What vibe hunting gets right about AI threat hunting, and where it breaks down
- Health insurance lead sites sell personal data within seconds of form submission
- Claude helps researcher dig up decade-old Apache ActiveMQ RCE vulnerability (CVE-2026-34197)
- Acrobat Reader zero-day exploited in the wild for many months
- AI agent intent is a starting point, not a security strategy