Help Net Security
Searching for evil
Computer security has recently imported a lot of ideas from economics, psychology and sociology, leading to fresh insights and new tools. I will describe one thread of …
Security update for AirPort Extreme 802.11n base station
A design issue exists in the IPv6 protocol’s handling of type 0 routing headers. Depending on network topology and capacity, the reception of specially crafted IPv6 …
NSA Secure Workstation Solution to use VMware
VMware announced an agreement with General Dynamics C4 Systems, a business unit of General Dynamics, to develop a complete turn-key High-Assurance Platform workstation using …
Best practices to combat SME security threats
SMEs face a different set of security challenges than enterprises and must adapt security policies and practices accordingly to avoid costly intrusions and that can cripple or …
Is PDF spam simply not working for the spammers?
Sophos has reported a dramatic decrease in the amount of spam emails using PDF file attachments to spread their unwanted messages. According to research compiled by …
Up to 59% of companies with active malware on their networks
Some 59% of companies that scanned between 20 and 30,000 PCs with Malware Radar had active malware on their computers, according to Panda Security’s Malware Radar, an …
Security Economics
Information security has finally become mainstream. It is almost a recognized profession, with its own areas of specialization: network security, audit, incident response, …
Symantec releases Norton Internet Security 2008, Norton AntiVirus 2008
Symantec launched Norton Internet Security 2008 and Norton AntiVirus 2008, industry leading security solutions that have been enhanced to provide computer users with …
5 Security Widgets for the Opera Browser
Widgets are Web programs you can run right on your desktop using Opera 9. This article introduces security-related widgets that will enhance your Opera experience. …
Intel vPro processor technology fortifies security
Intel further reinforced desktop PC security by unveiling the newest generation of Intel vPro processor technology for businesses and IT with new innovations that add better …
A closer look at Cryptainer LE: your own secure hidden data vaults
This tool enables you to secure your data and ensure that you are doing the best for your privacy. Cryptainer LE uses 256 bit AES encryption and works by creating multiple 25 …
Video: User Account Control in Windows Vista
Jason Fossen, an instructor at the SANS Institute, discusses the controversial User Account Control in Windows Vista.
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act