Help Net Security
Network intrusion prevention for world’s largest networks
Internet Security Systems (ISS) and Crossbeam Systems forged an alliance to deliver intrusion prevention on high-performance security switches. Through this alliance, …
New Netilla Security Platform (NSP) SSL VPN Product
AEP Networks unveiled the latest version of its AEP Netilla Security Platform (NSP) SSL VPN. The NSP Release 5.4 includes several performance improvements, new certifications, …
VeriFinger 5.0 SDK for biometric fingerprint recognition comes to Mac OS X
The VeriFinger 5.0 Software Development Kit (SDK) is the first major fingerprint identification SDK to add support for the Mac OS X platform. VeriFinger 5.0 provides both 1:1 …
ScanSafe achieves Microsoft Gold Certified Partner status
ScanSafe has achieved Microsoft Gold Certified Partner status in the Microsoft Partner Program. Microsoft Gold Certified Partners have demonstrated the highest degree of …
Information security expert and industry veteran Michael Sutton joins SPI Dynamics
S.P.I. Dynamics, the expert in Web application security, today announced the addition of Michael Sutton, information security industry veteran, to the company as Security …
Exploiting vulnerabilities to infect computers has become a priority for cyber-crooks
Over the last few months we have witnessed a notable increase in exploits of security problems in commonly-used programs that could allow remote attacks by cyber-crooks. This …
Smoothwall protects against Internet Explorer Direct Animation Path ActiveX exploit
Internet security specialist SmoothWall announced that users of its Corporate Guardian, SmoothGuardian and School Guardian web security and content filtering systems have …
AES Software releases AES Password Manager 2.0
AES Software announces the release of version 2.0 of AES Password Manager, an advanced password management solution for both home and office users. AES Password Manager …
Cyberfraudsters detained in Spain
A large group involved in cybercrime and online fraud has been dismantled in Spain by the National Police last week. The authorities detained a total of 23 people all across …
Using Pict Encrypt for steganography purposes on Mac OS X
Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. Pict Encrypt …
Trojan bot exploits windows vulnerability, drops rootkit
A network creeping Trojan itself is insidious in nature and what if it uses a Rootkit to evade detection as well? Security Experts at MicroWorld Technologies inform that a …
Weekly Report on Viruses and Intruders – BarcPhish phishing attack, the Spamta.X and Microsoft vulnerabilities
This week’s report from Panda Software looks at the BarcPhish phishing attack, the Spamta.X worm and the MS06-052, MS06-053 and MS06-054 vulnerabilities affecting some …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act