Help Net Security
New identity theft and online fraud techniques
Authors of computer viruses and threats -including phishing scams- are looking for direct financial profit from cybercrime. For this reason, they are using more innovative and …
10 Tips for Reducing Storage TCO
Relying on big vendors to design and implement your storage systems is often considered a safe approach. However, it allows vendors to take control over your storage systems …
Two-factor authentication solution for OpenVMS systems
Process Software announced that it has achieved technical interoperability certification between the VMS Authentication Module and RSA SecurID two-factor authentication …
SECUDE secure notebook with additional functionality
SECUDE secure notebook 7.2 – the latest version of its popular security solution, with an extended range of features for greater all round security. SECUDE secure …
Suspected email scam ringleader arrested in Nigeria
Police in Amsterdam claim that the ringleader of an email scam that stole up to two million US dollars has been arrested in Nigeria’s economic capital, where more than …
CP Secure Content Security Gateway available with Websense Web Security Suite
Websense, Inc. and CP Secure, Inc., announced today that the CP Secure Content Security Gateway (CSG) appliance is now available integrated with Websense Web Security Suite …
NetManage to resell SSH Tectia products
SSH Communications Security Corp. and NetManage, Inc. announced a solution partnership agreement. Through this agreement, NetManage will resell SSH Tectia Client, Server, and …
AirDefense announces Mobile 4.0 product
AirDefense today announced the release of AirDefense Mobile 4.0, the newest version of the company’s security and wireless network assessment tool. Mobile 4.0 includes a …
Controversy around the index.dat Windows file
Oxygen3 is reporting about the controversy that is building around the INDEX.DAT file used by Microsoft Internet Explorer. This file works like a database with redundant …
Weekly Report on Viruses and Intruders – spying, hijacking computers and stealing bank details
This week’s report from Panda Software on viruses and intruders clearly reflects the new dynamic influencing malware creators. The three examples of malicious code …
Cyberoam Unified Threat Management appliances enchanced with identity-based firewall
Elitecore technologies, vendor of UTM appliances has introduced a unique user identity-based firewall that delivers consolidated, single-point security in the integrated …
“Practical Guide to Computer Forensics” released
J. Frank Grindstaff, Jr. CPA, and David Benton, CFCE, the authors of “Practical Guide to Computer Forensic”, have crafted a timely book for accountants, auditors, …
Featured news
Resources
Don't miss
- Using cognitive diversity for stronger, smarter cyber defense
- Microsoft fixes actively exploited Windows Hyper-V zero-day flaws
- Fortinet fixes FortiOS zero-day exploited by attackers for months (CVE-2024-55591)
- Malicious actors’ GenAI use has yet to match the hype
- This is the year CISOs unlock AI’s full potential