Help Net Security
CORE IMPACT earns perfect score in SC Magazine product review
Core Security Technologies announced that CORE IMPACT earned a perfect score and received one of the first “Lab Approved” awards from SC Magazine. In its group …
Oracle about to issue 52 new critical patch updates
Oracle has just issued its first ever pre-release announcement flagging up no fewer than 52 new critical patch updates which will be formally issued this Tuesday.  …
Creating A Culture Of Security – The Real Challenge
Why is business still plagued by poor data security? Why do we constantly read stories about security breaches, data theft and customer lawsuits stemming from confidential …
More than 30,000 IT pros attained CompTIA Security+ certification
The Computing Technology Industry Association (CompTIA) announced today that its CompTIA Security+ certification, a benchmark of information technology (IT) security …
Anti-spam technology of the year
IronPort’s C-Series appliance was recognized with InfoWorld’s 2007 Technology of the Year Award, ranking IronPort at the top of its class. The IronPort solution …
Blancco erasure software Stealth Cleaner 2.0 released
Blancco released Stealth Cleaner 2.0, a technologically advanced erasure software. It is highly secure and is designed to safeguard your data if your laptop or PC is lost or …
O’Reilly releases Windows Vista: The Missing Manual
Microsoft will release Vista to general consumers early this winter–but without a user’s manual. Thankfully, David Pogue’s Windows Vista: The Missing Manual …
This week we had Bagle.LA worm and Mitglieder.MF trojan
Bagle.LA is a worm that connects to several web pages to download a list of email server IP addresses. Like all the other worms in the Bagle family, Bagle.LA uses that …
New universal man-in-the-middle phishing kit discovered
RSA uncovered a new phishing kit being sold and used online by fraudsters.This new kit, a Universal Man-in-the-Middle Phishing Kit, is designed to facilitate new and …
Shortcut guide to securing automated file transfers
Realtime Publishers and SSH Communications Security announced the immediate availability of The Shortcut Guide to Securing Automated File Transfers. The new eBook, authored by …
IBM ISS discovers vulnerabilities in CA Storage Management product
IBM announced that its Internet Security Systems (ISS) X-Force research and development team has discovered and preemptively protected customers from two similar, but distinct …
Financial services institutions should consider outsourcing as IT security concerns increase
Financial services institutions should consider outsourcing as IT security concerns increase Company-wide information security used to reside primarily in the realm of arcane …
Featured news
Resources
Don't miss
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine
- Stop settling for check-the-box cybersecurity policies
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)