Help Net Security
A study into corporate end user awareness of Web threats
Trend Micro announced the results of its study into corporate end users’ awareness of Web threats. The study tracked responses from 1600 corporate computer end users …
AT&T offers new security alerting and notification service
AT&T Inc. recently announced the availability of My Internet Protect, a security knowledge mining, alerting and notification service for identified threats that enter a …
SAIC addresses possible data compromise
Personal information of certain uniformed service members, family members and others was placed at risk for potential compromise while being processed by SAIC under several …
Video: Exploiting the iPhone
This is the demonstration of an iPhone exploit developed by the software security group at Independent Security Evaluators.
New Excel spam hits the airwaves
Microsoft Excel is the newest packaging spammers have created for their stock pump-and-dump scams, Commtouch reported today, based on the Company’s analysis of billions …
Lock the Door and Make Sure Your Data is Protected
You would think that at some point in time your children will reach the age at which you can reason with them, I’m hoping it’s a year older than the oldest one is …
Microsoft Excel virus and a ransomware trojan
It is very easy to know when Pahooka.A has infected a computer. Once run, it replaces the computer’s desktop wallpaper with a multicolored star on a blue background and …
Peer-to-peer software leaks confidential police data
IT security and control firm Sophos is reminding companies of the importance of enforcing stringent IT security policies after it was revealed that a Japanese policeman has …
Data protection made better with Encryptionizer
NetLib announced the availability of the company’s next release of its flagship product, NetLib Encryptionizer. The company’s enhanced data encryption solution …
LaCie unveils 2TB Big Disk Extreme+ with advanced backup software
LaCie unveiled the triple-interface Big Disk Extreme+ with LaCie Shortcut Button and included EMC Retrospect backup and recovery software for Windows/Mac OS. This versatile …
The Rules for Computer Forensics
The recovery of evidence from electronic devices is fast becoming another component of many the IT Manager’s remit. Electronic evidence gathered is often valuable …
How To Recover Forgotten Microsoft Word Passwords
Microsoft Office applications have an option for setting up different levels of passwords. They can be used for specific actions such as preventing reading, writing or adding …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act