Help Net Security
Assessing Java Clients with the BeanShell
Assessing the security of Java applications, and particularly client-server applications, can be a tedious process of modifying the code, compiling, deploying, testing and …
What Should Businesses Require of Data Protection Solutions?
Data protection today is one of the most innovative and fast-moving areas of Information Technology. Data protection technology developers have, in recent years, engaged in …
DOJ Deploys AppSecInc’s vulnerability assessment technology
Application Security announced that the United States Department of Justice (DOJ) is utilizing the company’s vulnerability assessment scanner, AppDetective to reduce and …
Sensitive information can still be found on second hand disks
BT, the University of Glamorgan in Wales and Edith Cowan University in Australia today issued a report based on research to determine whether second hand computer disks that …
Worms exploit critical Microsoft security vulnerability
Sophos is warning computer users of malware that is exploiting a critical security vulnerability in Microsoft software, and urging companies to roll-out security patches as a …
Mac Password Generator 1.0 released
Password Generator is a Mac OS X application that allows users to generate strong passwords for all their accounts. Of significant note, this release allows users to customize …
First portable anti-spyware product for U3 smart drive platform
ParetoLogic announced XOFTspy Portable Anti-spyware product, the first portable anti-spyware product operating directly from U3 smart drives. Built on its popular anti-spyware …
New worm claims to show you pictures of Paris
If you get an email from one of your friends, with a subject line-“My Photo on Paris’, do not click and download the zipped attachment. The poor fellow has …
Info on HITBSecConf2006 Capture The Flag contest
Hack In The Box (M) Sdn. Bhd. has announced that it will once again host the region’s best known Capture The Flag hacking competition during the upcoming HITBSecConf2006 …
How to Start Up a Mobile Security Project
The proliferation of laptops, PDAs, smartphones and USB sticks means that corporate data is no longer confined to the office. Without a joined-up policy on mobile security, …
Up to one in 600 social-networking pages host malware
ScanSafe has released its latest Global Threat Report on Web filtering, spyware and viruses According to an analysis of more than five billion Web requests in July, ScanSafe …
Warning of a serious BlackBerry security threat
Secure Computing Corporation warn that organizations that have installed their BlackBerry server behind their gateway security devices could be subject to a hacking attack …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025