Help Net Security
Cyberoam Unified Threat Management appliances enchanced with identity-based firewall
Elitecore technologies, vendor of UTM appliances has introduced a unique user identity-based firewall that delivers consolidated, single-point security in the integrated …
“Practical Guide to Computer Forensics” released
J. Frank Grindstaff, Jr. CPA, and David Benton, CFCE, the authors of “Practical Guide to Computer Forensic”, have crafted a timely book for accountants, auditors, …
SecureMac announces MacScan 2.2 spyware protection
SecureMac announced the release of MacScan 2.2, a minor update to its popular anti-spyware program. Starting with MacScan 2.1, MacScan has been totally revamped and is now a …
Guidance Software named one of the top 5 electronic discovery software providers
Guidance Software was named one of the top five electronic discovery software providers by the fourth annual Socha-Gelbmann Electronic Discovery Survey. Additionally, the …
NetIDMe virtual ID card may pose problems
A virtual ID card designed to improve children’s net safety has been launched in the UK, US, Canada and Australia. The NetIDMe card can be swapped by children online …
Panda Antivirus 2007 launched
Panda Software is launching the new Panda Antivirus 2007, the lightest antivirus in the Panda Software consumer solutions range. This new, easy-to-use, antivirus solution …
Backdoor Trojan threatens to take over user computers
What if your computer boots on its own, logs on to websites that it wants, downloads harmful stuff like no one’s business, takes commands from someone in hinterland …
Centrino wireless flaw leaves laptops vulnerable
Sophos has advised computer users to ensure they are running the latest security patches following the announcement of vulnerabilities in Intel Centrino’s wireless …
Security vulnerability in Sun N1 Grid Engine daemons
Sun has published a security advisory confirming the existence of a denial of service vulnerability in Sun N1 Grid Engine.The problem lies in the fact that Sun N1 Grid Engine …
Nine Ways to Stop Industrial Espionage
If we”re honest every one of us imagine what we’d do with a few million in the bank. The yacht in Cannes, the private jet in Nice, possibly our own football team, …
Apple security update 2006-004 is now available
Security Update 2006-004 can be downloaded and installed using Software Update, or from Apple Downloads. Security Update 2006-004 is recommended for all users and improves the …
Secure-It introduces iPod security cases
Secure-It today introduced The Pod Safe, designed to keep your iPod and your music safe from theft. The cases are constructed from PolyCarbon strengthened ABS and include a …
Featured news
Sponsored
Don't miss
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege
- Cloud security threats CISOs need to know about