Help Net Security
Finjan’s real-time web security solution with new advanced security enhancements
Finjan announced the release of Vital Security Version 8.5 for all of its web security appliances. TKey highlights of this product release include integrated …
Instant password recovery for Microsoft Office documents
Intelore announces the release of Office Password Recovery v.2.0. The new release adds an ability to instantly recover lost or forgotten passwords in Microsoft Office …
eEye rolls out exploit consulting services
eEye Digital Security today announced availability of eEye Preview Service, a three-tiered security intelligence program. This program is comprised of multiple and …
Nearly 40 percent of large organizations don’t monitor databases for suspicious activity
Application Security today announced from the Gartner IT Security Summit the results of a Ponemon Institute survey underscoring the serious challenges organizations face in …
90% of mail received by companies in May was spam
According to data compiled by TrustLayer Mail, the managed security service from Panda Software, 90 percent of email that reached companies in May was spam. This data has been …
Details on Microsoft Identity Lifecycle Manager 2007
Peter Houston, the Senior Director for Identity and Access Management at Microsoft speaks about Microsoft Identity Lifecycle Manager 2007 and provides details about how this …
The usual worms top virus charts
Netsky, Bagle and Sober are topping the rankings again, just as they were a few years ago. We could have seen this coming. Netsky.t and Netsky.q have been among the leaders in …
Weekly malware report – MSN Messenger worm and Bank trojans
This week’s PandaLabs’ report focuses on the Bankey.A, BankFake.A, Ketawa.A and the Opticibot.A Trojans and informs about Braban.F, a worm that spreads through MSN …
9,500 new infected web pages every day
Sophos has revealed the most prevalent malware threats causing problems for computer users around the world during May 2007. The figures compiled by Sophos’s global …
Wardriving in London 2007
Conducting regular research into WiFi networks and wireless protocols can help us gain a better understanding of the true state of affairs in this area. When possible, we try …
Most threats detected in May were related to financially motivated cyber-crime
Trojans and adware were responsible for 49.8 percent of all infections detected by Panda ActiveScan in May. Specifically, Trojans were the culprits of 26.14 percent of …
Secure Computing files patent infringement and a lawsuit against Finjan Software
Secure Computing has filed a patent infringement and unfair competition lawsuit against Finjan Software in the U.S. District Court — District of Minnesota.In its …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)