Help Net Security
Danger behind instant messaging applications
Instant messaging has become increasingly popular lately. Programs like MSN Messenger, Yahoo! Messenger, AIM, etc, are more and more used as a means of communication among …
Server with top-secret data stolen from Forensic Telecommunications Services
The Forensic Telecommunications Services (FTS) has confirmed the theft of a computer server containing thousands of top-secret mobile phone records and evidence from …
Hardware based login for Windows Vista
Teslain’s Rohos Logon Key v.2.4 converts any USB drive into an access key for Microsoft Windows Vista, installing the new hardware based credential provider. Rohos Logon …
Power analysis training program in support of proposed FIPS 140-3 Standard
Cryptography Research, Inc. announced the availability of test equipment and a training program on power analysis attacks for FIPS 140-3 validation laboratories and product …
RSA to acquire data loss prevention expert Tablus
RSA announced its intent to acquire Tablus Inc., a leading provider of data loss prevention solutions based in San Mateo, California. Tablus is privately-held; further details …
Application control software and device management USB device combo
PatchLink is working withwith RedCannon Security to provide organizations with a secure environment for USB device use within the corporate network and beyond. Together, …
Early-warning system for Web 2.0 threats
Websense unveiled new technology that finds security attacks launched within Web 2.0 applications and delivers threat protection to customers within minutes. While Web 2.0 …
Oracle’s new centralized security and user authentication services for Linux
Oracle announced the preview release of Oracle Authentication Services for Operating Systems, a new offering within Oracle Identity Management. It is designed to make user …
New corporate antispyware solution with antivirus functions
Webroot Software announced the release of Webroot AntiSpyware Corporate Edition with AntiVirus. In addition to compatibility with the Windows Vista operating system, key new …
Bank changes its name, phishers smell the potential
UTI bank, one of the leading banks in India has changed its name to “Axis’. And who better than phishers know to fish in the muddy waters of confusion. Security …
Guide to Online Antivirus Solutions Part 3: Kaspersky Online Scanner
Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …
Watch out for cyber sharks – new tool for creating trojans
PandaLabs has discovered Shark 2, a tool for creating Trojans which is being distributed on several Internet forums. Its creators have launched several updates, so there are …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act