Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Malware detection for Nessus vulnerability scanner

Tenable announced new malicious process detection capabilities on Windows computers for the Nessus vulnerability scanner. This new functionality complements and extends AV …

Juniper Networks enhances its Mykonos Web Security software

Juniper Networks announced major platform enhancements to its Mykonos Web Security software. The new release provides 30 new features and enhancements that strengthen …

Advanced Internet Protocols, Services, and Applications

Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions …

UFED Touch: Field-ready mobile forensics solution

Cellebrite launched UFED Touch, a solution for investigators to extract and decode digital evidence from mobile devices including smartphones, legacy phones, portable GPSs and …

17% of the world’s PCs are unprotected

Lack of consumer PC protection is a global problem. In a study that analyzed data from voluntary scans from an average of 27-28 million computers per month, McAfee researchers …

Security posture management from FireMon

FireMon announced Security Manager 6.0, a security policy and posture management solution that integrates risk analysis with configuration management, enforcement and auditing …

(IN)SECURE Magazine issue 34 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 34 has been released today. Table of contents: …

Security and privacy in the AWS cloud

Security is the number one question that most C-Level executives ask about the cloud. In this video, Stephen E. Schmidt, General Manager and CISO, shares some of the details …

Securing the Virtual Environment

As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small …

Flamer removal tool from Bitdefender

Bitdefender released a tool to find and remove the most complex, dangerous spy tool yet discovered, the newly discovered Flamer attack toolkit. Flamer, also known as Skywiper, …

What’s new in ISO 22301: How to make a transition from BS 25999-2

Currently there are many business continuity frameworks and standards around the world, but none of them have really taken the dominant position. ISO 22301 will probably …

Trojan spyware promoted as Steam keygen

Scouring the Web for “legitimate” key generators, or keygens, is a risky business at the best of times. We make it a point that whoever the source is must have …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools