Help Net Security
Video on targeted attacks
F-Secure’s Mikko Hypponen discusses the issue of Targeted Attacks.
Spyware Doctor gets a major overhaul
To make award-winning Spyware Doctor even more potent, PC Tools developers spent nearly two years rewriting their bullet-proof anti-malware technology to combat the next …
Securent joins with OASIS
Securent announced that it is a Sponsor Member of the Organization for the Advancement of Structured Information Standards (OASIS). OASIS is a not-for-profit, international …
Web application security tool extended for checking .NET applications
Fortify Software announced the extension of its Fortify Defender solution for applications written in the .NET language. Fortify Defender’s sophisticated technology …
nCipher payShield used by a leading bank in Croatia
nCipher announced that its payShield hardware security module (HSM) has been deployed at the core of a new telephone and internet banking system in Croatia. Privredna Banka …
2006 – a good year for Cyber-Ark
According to Cyber-Ark, 2006 marked a year of tremendous prosperity and growth in the emerging Privileged Password Management (PPM) market as regulatory compliance, along with …
First EAL4 evaluation to Swedish Common Criteria Scheme
atsec information security AB is performing an EAL4+ evaluation of Tutus Data AB F?¤rist VPN and Firewall for certification by the Swedish Certification Body for IT Security …
Biometrics: What and How
Humans use body characteristics to recognize each other. Some characteristics don’t change over time and some do. What characteristics do we use for identifying people? …
New solution in the secure file storage market
Dekart launched a new software product, Dekart File Move. This application is a real breakthrough in the secure files storage field. Private Disk File Move is designed to …
Malware of the week: Piggi.B worm, ReverseClick.A trojan and VideoCach adware
The Piggi.B worm, the ReverseClick.A Trojan, the VideoCach adware, and the potentially unwanted program (PUP) XPCSpy are the subject of this week’s PandaLabs report. The …
Vulnerability in the IPv6 protocol stack of OpenBSD
CoreLabs discovered that the OpenBSD kernel contains a memory corruption vulnerability in the code that handles IPv6 packets. Exploitation of this vulnerability can result in …
New Trojan variant steals confidential usernames and passwords
A Trojan variant named “Win32.LdPinch.kj’ can steal system usernames and passwords, get confidential data from applications and open a Backdoor in the compromised …
Featured news
Resources
Don't miss
- Data-stealing VS Code extensions removed from official Marketplace
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools
- Third-party cyber risks and what you can do