Help Net Security
PCI compliance and vulnerability scanning suite for just $99
Research published recently within the security industry confirms that, while PCI is important, it is only one part of a larger vulnerability management framework for …
The State of Database Security
Ted Julian is the VP of Marketing and Strategy at Application Security Inc. In this video he discusses the current state of database security and offers some insight on what …
API for OpenSSL developers to add elliptic curve cryptography to their applications
Certicom announced Security Builder API for Open Source to help OpenSSL developers easily add elliptic curve cryptography (ECC) to their applications. The SSL shim, or …
“Mind Games” – a psychology study on cyber criminals
In the study titled “Mind Games,” the primary author, Dr. James Blascovich, Professor of Psychology at the University of California, Santa Barbara, offers analyies …
Log-on to Windows computers with your fingerprint
IOGEAR just released Personal Security Mouse with Nano Technology (GMEFP1W6), a solution offering fingerprint scan to log-in to a computer Additional features include file / …
Season of security product beta testing contests
A couple of days ago we covered BitDefender’s new beta testing program where breaking their software could get you techie gear such as Sony Playstation 3, Microsoft …
Spammers deflate Pump and Dump spam tactics
According to the security provider Marshal, pump ‘n dump spam has dropped significantly. Stock spam now represents five percent of all spam compared to 50 percent in …
New Trend Micro security enhancement package for Windows Vista
Trend Micro today announced the availability of Trend Micro OS Protection, a security enhancement package for Windows Vista users running Trend Micro Internet Security. This …
Poison Ivy can take over your computer
The malware named PoisonIvy.r comes into computers through various online utilities, dubious software programs and movie downloads from infected websites. MicroWorld experts …
A closer look at Eraser, a secure data removal tool
Eraser is a secure data removal tool for Windows. It completely removes sensitive data from your hard drive by overwriting it several times with carefully selected patterns. …
Firefox Security and Privacy Extensions
In the last few years Firefox gained a massive support from surfers worldwide. This is mainly because Internet Explorer, still the biggest player on the market, has proved to …
Dirty duo guilty of obscene spam act
Jury convicts two men on multiple charges including fraud and transportation of obscene materials IT security and control firm Sophos has welcomed news that two men have been …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025