A straightforward guide to a complex topic: how to encrypt email with PGP or GPG
In today’s world of electronic eavesdropping and computer security breaches, who isn’t a little paranoid? The fact is, email isn’t private. Any number of …
Application falsely identifies security products as spyware
SurfControl announced that its Threat Analysts have identified a rogue anti-spyware application, UnSpyPC, which falsely identifies popular security products and well known …
Sudoku game installs spyware on computers
Several web pages -mainly with pornographic or illegal content- are downloading spyware programs onto the computers of visitors to the sites without their consent. These web …
Newly formed Pointsec Wireless Solutions to focus on encryption
Pointsec Mobile Technologies announced the formation of Pointsec Wireless Solutions, a self-sustained business unit within Pointsec Mobile Technologies that will be focused on …
McAfee brings us Total Protection Solutions
Today, at Infosec World 2006 in Orlando, McAfee unveiled McAfee Total Protection. Designed to redefine the way in which companies manage security solutions, McAfee Total …
Free password utility: Aurora Password Manager
Animabilis Software released Aurora Password Manager, a tool helping you protect your passwords. Not only does it take care of your private information, but it also features a …
U.S. House of Representatives confirms encryption as the best safeguard to protect sensitive data
The Energy and Commerce Committee of the U.S. House of Representatives unanimously approved The Data Accountability and Trust Act (H.R. 4127), a bill that requires companies …
Kaspersky Lab Virus Top 20 for March 2006
Kaspersky Lab, a leading developer of secure content management solutions that protect against viruses, Trojans, worms, hacker attacks, spyware and spam, presents a combined …
Top 10 Viruses and Hoaxes Reported To Sophos in March 2006
Sophos, a world leader in protecting businesses against viruses, spyware and spam, has revealed the top ten viruses and hoaxes causing problems for businesses around the world …
Weekly Report on Viruses and Intruders – Bagle Worm IB and IZ Variants
Every week, Panda Software publishes a report with information explaining the most notable viruses and threats that have appeared during the week. In this week’s report, …
Excel Password Recovery Master to the rescue
Excel Password Recovery Master ia dedicated tool to unlock Excel files and decrypt their content. The software gracefully removes all types of protection in Excel documents. …
New Peer-To-Peer trojan worm attacks enterprises
Security experts at MicroWorld Technologies inform that “Trojan.Win32.Inject.t’ or “W32/Inject-H’ is a new peer-to peer worm with IRC backdoor Trojan …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)