Help Net Security
Trojans: weapon of choice for cyber-crooks
Trojans accounted for 74 percent of new malware variants that appeared during the first quarter of 2007, according to PandaLabs. This represents an increase of 20 percent …
EMEA release of Sunbelt Messaging Ninja v2.1
Nayatek announced today at Infosecurity Europe 2007 the official EMEA release of Sunbelt Messaging Ninja version 2.1, the all-in-one, best-of-breed email security product for …
Rise of web-based malware in Q1 2007
Sophos has announced the results of its research into worldwide cybercrime activity during the first three months of 2007. The findings reveal that the overall number of new …
Five percent of world’s spam sent via Polish ISP
Earlier this month, Sophos revealed that there was a surprise newcomer to the dirty dozen spam relaying countries. Having never made an appearance in this chart previously, …
Top 10 Threats in March
During the month of March, Trojan Downloader Zlob was the most commonly found Trojan worldwide. This Trojan often silently downloads and installs bogus security programs such …
Report reveals overconfidence in application penetration testing
Fortify Software has released a report, entitled “Misplaced Confidence in Application Penetration Testing,” that details overconfidence in application penetration …
Remote management solution for encrypted backup tapes and optical discs launched
DISUK launched iSecure smart card management for its Paranoia2 and SafeTape in-line encryption devices that keep vital backup data secure and compliant with standards such as …
Huntsman 5 defends against unknown threats
Tier-3 has launched Huntsman 5 which provides complete enterprise wide threat management, real time compliance and operational risk management capabilities. …
PDF security book: “Building or Buying VPNs”
Short Cuts are short, concise, PDF documents designed specifically for busy technical professionals. Pearson just released the following title: Building or Buying VPNS …
Georgia Southern computer security expert authors new reference book “Computer Forensics”
Computer security expert Robert Newman says the average person has no idea how much information is available about him or her in cyberspace or how to prevent that information …
Secure input, management, analysis and sharing of critical information with Memex Series VI
Memex announced the availability of Memex Series VI, a full suite of software tools that enables the secure input, management, development, analysis and sharing of …
Another vendor joins Open Web Application Security Project
Cenzic announced that the company has joined the Open Web Application Security Project (OWASP), a not-for-profit foundation, as a Vendor Organization member and will sponsor …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)