Help Net Security
Trend Micro Introduces Network VirusWall Enforcer
Trend Micro Incorporated announced Network VirusWall Enforcer, its second-generation enterprise-class Network Access Control (NAC) appliance that ensures that all devices — …
Automated Patch Management
It’s nearly impossible to escape computer-based information in today’s high-tech society. From doctors’ offices to hardware stores, organizations and …
Secure Computing Launches SafeWord SecureWire Access Management Appliance
Secure Computing Corporation announced the launch of its powerful SafeWord(r) SecureWire(tm) identity and access management (IAM) appliance – the access, authentication …
First Secure LAN Switch announced
ConSentry Networks, a leadin gprovider of secure LAN solutions, today announced the LANShield Switch, an enterprise-class switch that integrates the security features needed …
IntelligenceFocus launches non-conventional defence against phishing
IntelligenceFocus has released a new generation of security appliances able to convert traditional internet networks into phishing-immune networks. Proprietary DigiProbe …
Web Based Risk and Compliance Management service released
In its participation at InfoSec Europe 2006, RiskComp Ltd. announced the launch of the World’s first fully managed Web based Risk and Compliance Management Service. This …
SnapGear Unified Threat Management SMB Appliances launched
This was announced earlier today during the Infosecurity Europe 2006 conference and expo. Secure Computing Corporation announced the introduction of its SnapGear portfolio of …
BiometricPIN technology on Cherry keyboards
This was announced earlier today during the Infosecurity Europe 2006 conference and expo. Cherry Electrical products is set to enable its range of G83-14400 and G83-14500 …
Feebs Worm Spreads via email and P2P
Security Analysts from MicroWorld Technologies inform that “Worm.Win32.Feebs.db’ is a new entrant to the Feebs family that spreads via email, P2P Networks and Web …
Weekly Report on Viruses and Intruders – Goldun.IL Trojan, HarBag.A and false blog virus
This week’s report includes two new codes that, although they have different functions and characteristics, share the same aim: steal user data. What’s more, …
A Modular Approach to Data Validation in Web Applications
Data that is not validated or poorly validated is the root cause of a number of serious security vulnerabilities affecting applications. This paper presents a modular approach …
Oracle releases scheduled critical patch update
Oracle released a scheduled security update for its products this Tuesday. A whole range of vulnerabilities is fixed in Oracles Database products, E-Business Suite and other …
Featured news
Sponsored
Don't miss
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege
- Cloud security threats CISOs need to know about