Help Net Security
Most threats detected in May were related to financially motivated cyber-crime
Trojans and adware were responsible for 49.8 percent of all infections detected by Panda ActiveScan in May. Specifically, Trojans were the culprits of 26.14 percent of …
Secure Computing files patent infringement and a lawsuit against Finjan Software
Secure Computing has filed a patent infringement and unfair competition lawsuit against Finjan Software in the U.S. District Court — District of Minnesota.In its …
Banker Trojans imitating phishing attacks
A new wave of Trojans is using phishing-type techniques to steal users’ bank details. BanKey.A and BankFake.A are the latest such examples. When run, both Trojans show …
AppGate’s Unified Access Control Solution with support for Windows Mobile 6
AppGate Network Security has developed a new standard client for Microsoft Windows Mobile 6 with new and improved features to support wireless and mobile networking with full …
The whole security suite on a USB stick
Yoggie Security Systems announced the launch of a groundbreaking new concept in personal security appliances for laptops and PCs: for the first time users can access 13 …
New version of DeviceWall endpoint security product
Centennial Software announced the latest version of its Centennial DeviceWall 4.6, available in a Standard or OEM-specific Content Aware Editions. The new editions not only …
PC Tools acquires world-class behavioral malware technology
PC Tools today announced the acquisition of Cyberhawk from Colorado-based Novatix Corporation and the establishment of a new advanced research office in Boulder. The …
Survey Reveals Scandal of Snooping IT Staff
Whilst you sit at your desk working innocently away, little do you realize that one in three of your IT work colleagues are snooping through company systems, peeking at …
Is your company PCI DSS compliant?
GFI Software, a leading developer of network security, content security and messaging software, has today launched a white paper to explain what the Payment Card Industry Data …
New worm spreads via email, web and network shares
“Here is your documents’, “Mail Delivery System’, “Mail Transaction Failed’ or “Re: Thank you for delivery’. If you chance upon …
Internet Spyware Prevention Act a leap forward in protecting online consumers
PC Tools is pleased to see House passage of the Internet Spyware (I-Spy) Prevention Act of 2007, providing the justice system with greater power and resources to prosecute …
A look at the MSN photo worm and a trojan with 9 different malware inside
This week’s PandaLabs’ report focuses on Conycspa.AJ, a dangerous Trojan that downloads nine malicious codes onto computers. It also focuses on Briz.X, a Trojan …