Help Net Security
Info on HITBSecConf2006 Capture The Flag contest
Hack In The Box (M) Sdn. Bhd. has announced that it will once again host the region’s best known Capture The Flag hacking competition during the upcoming HITBSecConf2006 …
How to Start Up a Mobile Security Project
The proliferation of laptops, PDAs, smartphones and USB sticks means that corporate data is no longer confined to the office. Without a joined-up policy on mobile security, …
Up to one in 600 social-networking pages host malware
ScanSafe has released its latest Global Threat Report on Web filtering, spyware and viruses According to an analysis of more than five billion Web requests in July, ScanSafe …
Warning of a serious BlackBerry security threat
Secure Computing Corporation warn that organizations that have installed their BlackBerry server behind their gateway security devices could be subject to a hacking attack …
DesktopSecure for Linux for Ubuntu 6.06 LTS available
Following the launch of Ubuntu 6.06 LTS earlier this month, Canonical made Panda Software DesktopSecure for Linux available to all users of Ubuntu 6.06. Combining the security …
Microsoft patches 9 critical vulnerabilities
Microsoft alerted us this time about 12 vulnerabilities of which nine were rated critical and three important. There are vulnerabilities in the Server service, the DNS …
The Cult of the Dead Cow starts community based web application for malware analysis
The Cult of the Dead Cow (cDc), a prominent technology activist group, announced a new application designed to collect, analyze, and ultimately help defeat malicious software. …
Majority of workers ignore the risks of web links and attachments in emails
A survey into the habits of 142 UK office workers conducted by Finjan, the global provider of best-of-breed proactive web security solutions, has uncovered that although they …
Latest email scam offers JFK assassination secrets for sale
IT security firm Sophos has warned computer users to be wary of an email claiming to come from a dying KGB agent, offering to pass on secrets of the John F Kennedy …
New identity theft and online fraud techniques
Authors of computer viruses and threats -including phishing scams- are looking for direct financial profit from cybercrime. For this reason, they are using more innovative and …
10 Tips for Reducing Storage TCO
Relying on big vendors to design and implement your storage systems is often considered a safe approach. However, it allows vendors to take control over your storage systems …
Two-factor authentication solution for OpenVMS systems
Process Software announced that it has achieved technical interoperability certification between the VMS Authentication Module and RSA SecurID two-factor authentication …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act