Help Net Security
Verizon Business to acquire Cybertrust and ICSA Labs
Verizon Business today announced a definitive agreement under which it will acquire Cybertrust, a privately held provider of global information security services. Financial …
New release of Intellitactics Security Manager features security know how
With this release, Intellitactics adds more capability for speedy implementation and simplified use so that more companies can enjoy the benefits to be reaped from effective …
The first mobile SSL VPN for Smartphones
Aventail announced Aventail Connect Mobile for smartphones—the industry’s first and only SSL VPN to provide full support and secure end point control for Windows Mobile …
Results from Distributed Open Proxy Honeypot Project
Breach Security announced the results of the Web Application Security Consortium’s (WASC) new Distributed Open Proxy Honeypot Project. The Honeypot Project is capturing …
Fortify integrates intellectual property from the Secure Software acquisition
Fortify Software announced the release of a major update to the Fortify Secure Coding Rulepacks. The update includes the integration of intellectual property obtained from …
F-Secure Anti-Virus for Microsoft Exchange Version 7 just released
F-Secure today announced the availability of the newest addition in its family of corporate data protection solutions: F-Secure Anti-Virus for Microsoft Exchange Version 7. It …
Weekly report on viruses, trojans and malware
This week’s PandaLabs’ report focuses on three Trojans, Alanchum.VL, Downloader.OHC and Cimuz.FH, and a worm that spreads through instant messaging, MSNDiablo.A. …
File Anti-Copy 3.1 security utility released
HiHiSoft has announced the immediate availability of File Anti-Copy 3.1, a simple security utility that will protect selected files from being opened, copied, or deleted …
160,000 computers infected with Mpack malware downloader
An exploit detected by NanoScan led PandaLabs on the trail to uncover Mpack, a program used to download malware onto remote computers by exploiting numerous vulnerabilites. …
How To Prepare For a Security Information and Event Management Deployment
Fail to prepare, as the saying goes, and you prepare to fail. This maxim certainly applies to most large-scale IT projects, and doubly so for Security Information and Event …
Transportation Security Administration sued for reckless violation of the Privacy Act
Calling the recent loss of employee personal data a breach of the Privacy Act, the American Federation of Government Employees (AFGE) — which represents employees …
Tool used to control botnets across 54 countries discovered
An investigation by PandaLabs has uncovered an application -called Zunker- created by cyber-crooks to control zombie computers in botnets. In the case discovered by PandaLabs, …