Help Net Security
Beta version of BitDefender 10 Internet Security for Microsoft Windows Vista
BitDefender announced that it now offers consumers one of the industry’s highest levels of antimalware protection for those using Microsoft’s new Windows Vista …
Trojan spreading and confidential information stealing malware
FormShared.A is a worm aimed at spreading the SpyForms.S Trojan across P2P file-sharing programs. To do this, FormShared.A uses its own P2P client. It creates a subfolder …
SquirrelMail 1.4.9a update fixes multiple vulnerabilities
Version 1.4.9a of SquirrelMail has been released. It fixes several cross-site scripting vulnerabilities that could be exploited to inject code in Web sessions. The first flaw …
X-Force predicts security trends for 2007
IBM X-Force announced several predictions for the top security trends of 2007. Among the host of threats on the security horizon for 2007, X-Force foresees broader and more …
New wave of FBI spam
BitDefender warns users about a new wave of spam aimed at poisoning Bayesian spam filters. The increased volume of spam was sparked by recent attempts by the FBI to curb spam …
A new worm creeps all over Myspace
It’s great to meet people online and befriend them, to share your thoughts, photographs, movies and much more. Even better when the community website is easy to login to …
First comprehensive tracking and analysis website for zero-day vulnerabilities
eEye Digital Security announced that it is offering the industry’s first vulnerability tracking site that focuses exclusively on zero-day vulnerabilities, or those …
Tips: Don’t give an identity thief the gift of your personal information
Whether you enjoy the hustle and bustle of shopping in stores or prefer the flexibility and convenience of online shopping, be careful to not give the gift of your personal …
BreachGate WebDefend web application firewall released
Breach Security announced the release of its BreachGate WebDefend Enterprise version 2.0 web application firewall. The new Enterprise version delivers a scalable enterprise …
The Truth About Patching
As arguments continue to rage about whether an agent-based or agentless patching technique is more effective, see which side you’re on after we dispel five common myths. …
Introduction to the Windows Management Instrumentation Command-line (WMIC)
It’s quite possible you’ve never heard of the Windows Management Instrumentation Command-line (WMIC), but this well kept secret command-line tool is immensely …
Featured news
Resources
Don't miss
- Data-stealing VS Code extensions removed from official Marketplace
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools
- Third-party cyber risks and what you can do