Help Net Security
The first mobile SSL VPN for Smartphones
Aventail announced Aventail Connect Mobile for smartphones—the industry’s first and only SSL VPN to provide full support and secure end point control for Windows Mobile …
Results from Distributed Open Proxy Honeypot Project
Breach Security announced the results of the Web Application Security Consortium’s (WASC) new Distributed Open Proxy Honeypot Project. The Honeypot Project is capturing …
Fortify integrates intellectual property from the Secure Software acquisition
Fortify Software announced the release of a major update to the Fortify Secure Coding Rulepacks. The update includes the integration of intellectual property obtained from …
F-Secure Anti-Virus for Microsoft Exchange Version 7 just released
F-Secure today announced the availability of the newest addition in its family of corporate data protection solutions: F-Secure Anti-Virus for Microsoft Exchange Version 7. It …
Weekly report on viruses, trojans and malware
This week’s PandaLabs’ report focuses on three Trojans, Alanchum.VL, Downloader.OHC and Cimuz.FH, and a worm that spreads through instant messaging, MSNDiablo.A. …
File Anti-Copy 3.1 security utility released
HiHiSoft has announced the immediate availability of File Anti-Copy 3.1, a simple security utility that will protect selected files from being opened, copied, or deleted …
160,000 computers infected with Mpack malware downloader
An exploit detected by NanoScan led PandaLabs on the trail to uncover Mpack, a program used to download malware onto remote computers by exploiting numerous vulnerabilites. …
How To Prepare For a Security Information and Event Management Deployment
Fail to prepare, as the saying goes, and you prepare to fail. This maxim certainly applies to most large-scale IT projects, and doubly so for Security Information and Event …
Transportation Security Administration sued for reckless violation of the Privacy Act
Calling the recent loss of employee personal data a breach of the Privacy Act, the American Federation of Government Employees (AFGE) — which represents employees …
Tool used to control botnets across 54 countries discovered
An investigation by PandaLabs has uncovered an application -called Zunker- created by cyber-crooks to control zombie computers in botnets. In the case discovered by PandaLabs, …
New solution ensures safety of backed-up and archived data
Teradata announced that it has expanded its partnership with Protegrity Corporation to offer Defiance BAR (backup, archive, and recovery) Encryption, a new software solution …
New eBay Phishing mail scares users into revealing information
What do you do when you receive an email from an online financial company that you regularly deal with, informing you about the completion of a transaction that you never did …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)