Help Net Security
Anti-spam technology of the year
IronPort’s C-Series appliance was recognized with InfoWorld’s 2007 Technology of the Year Award, ranking IronPort at the top of its class. The IronPort solution …
Blancco erasure software Stealth Cleaner 2.0 released
Blancco released Stealth Cleaner 2.0, a technologically advanced erasure software. It is highly secure and is designed to safeguard your data if your laptop or PC is lost or …
O’Reilly releases Windows Vista: The Missing Manual
Microsoft will release Vista to general consumers early this winter–but without a user’s manual. Thankfully, David Pogue’s Windows Vista: The Missing Manual …
This week we had Bagle.LA worm and Mitglieder.MF trojan
Bagle.LA is a worm that connects to several web pages to download a list of email server IP addresses. Like all the other worms in the Bagle family, Bagle.LA uses that …
New universal man-in-the-middle phishing kit discovered
RSA uncovered a new phishing kit being sold and used online by fraudsters.This new kit, a Universal Man-in-the-Middle Phishing Kit, is designed to facilitate new and …
Shortcut guide to securing automated file transfers
Realtime Publishers and SSH Communications Security announced the immediate availability of The Shortcut Guide to Securing Automated File Transfers. The new eBook, authored by …
IBM ISS discovers vulnerabilities in CA Storage Management product
IBM announced that its Internet Security Systems (ISS) X-Force research and development team has discovered and preemptively protected customers from two similar, but distinct …
Financial services institutions should consider outsourcing as IT security concerns increase
Financial services institutions should consider outsourcing as IT security concerns increase Company-wide information security used to reside primarily in the realm of arcane …
Email volume set to double in two months unless rate of spam slows
If the amount of spam and viruses being distributed continues to rise at its current rate, the quantity of email traffic online could well double yet again in as little as two …
2007 as year of corporate data leakage concerns and growth of profit-driven spam
Tumbleweed announced the five most pressing messaging security threats that will emerge or continue to plague IT security in 2007. As anticipated, data leakage concerns and …
Sophos acquires Endforce
Sophos announced that it has acquired Endforce, a leader in network access control (NAC) and endpoint security policy compliance solutions for enterprise customers. Sophos …
Automated Scanning vs. The OWASP Top Ten
The OWASP Top Ten is a list of the most critical web application security flaws – a list also often used as a minimum standard for web application vulnerability …
Featured news
Resources
Don't miss
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)
- Webinar: Amplifying SIEM with AI-driven NDR for IT/OT convergence
- How CISOs can elevate cybersecurity in boardroom discussions
- A humble proposal: The InfoSec CIA triad should be expanded