Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
New business security products from G Data Software

G Data Software announced the availability of its Version 11 product line, enhanced to provide businesses with the most up-to-date technology for protection across their …

NetSecL Linux 3.2 released

NetSecL is a hardened, live and installable operating system based on OpenSuse suitable for desktop/server and penetration testing. Once installed you can fully enjoy the …

Vulnerable firmware could destabilize Internet-enabled technologies

Kill switches and backdoors inserted at the point of manufacture could act as a conduit for organized criminals or foreign states to access internet-enabled devices, according …

Active Directory Change Reporter 7.0 released

NetWrix released Active Directory Change Reporter 7.0 which automates auditing of who changed what, when and where in Active Directory, Group Policy and MS Exchange, for …

Week in review: Booz Allen Hamilton breach, Google+ related scams and malware ecosystems

Here’s an overview of some of last week’s most interesting news and articles: “Casey Anthony confession video” scam spreads The verdict in the …

Verizon takes on issue of stolen credentials

Unauthorized access to corporate networks through stolen user names and passwords topped 45 percent in 2010, making credentials the second most compromised data type, …

Secure mobile device access on single authentication platform

SafeNet announced its new mobile device credentialing solution that enables the secure use of consumer mobile devices on corporate networks. SafeNet’s Authentication …

Mitigating software vulnerabilities

Microsoft released a new whitepaper that describes how exploit mitigation technologies can help reduce or eliminate risk, prevent attacks and minimize operational disruption …

Practical steps to improve your corporate security posture

Sony, Lockheed Martin, Nintendo, Groupon – In fact we could go on and on. Financial services, government agencies, health care records – It doesn’t matter. …

Trend Micro expands SecureCloud

Trend Micro SecureCloud, the encryption service with policy-based key management, has been expanded with a new offering designed for cloud service providers, as well as …

Apache Tomcat security bypass vulnerability

A security issue and a vulnerability have been reported in Apache Tomcat, which can be exploited by malicious, local users to bypass certain security restrictions or cause a …

Analyzing and dissecting Android applications for security defects and vulnerabilities

In March 2011, 58 malicious applications were found in the Android Market. Before Google could remove the applications from the Android Market they were downloaded to around …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools