Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Active Directory Change Reporter 7.0 released

NetWrix released Active Directory Change Reporter 7.0 which automates auditing of who changed what, when and where in Active Directory, Group Policy and MS Exchange, for …

Week in review: Booz Allen Hamilton breach, Google+ related scams and malware ecosystems

Here’s an overview of some of last week’s most interesting news and articles: “Casey Anthony confession video” scam spreads The verdict in the …

Verizon takes on issue of stolen credentials

Unauthorized access to corporate networks through stolen user names and passwords topped 45 percent in 2010, making credentials the second most compromised data type, …

Secure mobile device access on single authentication platform

SafeNet announced its new mobile device credentialing solution that enables the secure use of consumer mobile devices on corporate networks. SafeNet’s Authentication …

Mitigating software vulnerabilities

Microsoft released a new whitepaper that describes how exploit mitigation technologies can help reduce or eliminate risk, prevent attacks and minimize operational disruption …

Practical steps to improve your corporate security posture

Sony, Lockheed Martin, Nintendo, Groupon – In fact we could go on and on. Financial services, government agencies, health care records – It doesn’t matter. …

Trend Micro expands SecureCloud

Trend Micro SecureCloud, the encryption service with policy-based key management, has been expanded with a new offering designed for cloud service providers, as well as …

Apache Tomcat security bypass vulnerability

A security issue and a vulnerability have been reported in Apache Tomcat, which can be exploited by malicious, local users to bypass certain security restrictions or cause a …

Analyzing and dissecting Android applications for security defects and vulnerabilities

In March 2011, 58 malicious applications were found in the Android Market. Before Google could remove the applications from the Android Market they were downloaded to around …

Trend Micro Control Manager file disclosure vulnerability

A vulnerability in Trend Micro Control Manager can be exploited by malicious users to disclose sensitive information, according to Secunia. Input passed via the …

SSH client PuTTY 0.61 released

After four long years, here comes a new version of PuTTY, the popular free telnet/SSH client for Windows and Unix platforms. PuTTY 0.61 brings new features, bug fixes, and …

A look at Booz Allen leaked passwords

The recent attack against Booz Allen led to 90,000 leaked passwords. Unlike previous breaches where the passwords weren’t encrypted, it looks like in this case some care …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools