Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Database activity monitoring and vulnerability assessment

Sentrigo released Hedgehog Enterprise 4.1, a fully integrated database activity monitoring and vulnerability assessment solution. Hedgehog DBscanner now conducts checks for …

Secure network access for iPad, iPhone and iPod touch

F5 Networks announced that its BIG-IP Edge Client app and BIG-IP Edge Portal app are now available at the App Store. These apps provide iPad, iPhone, and iPod touch users with …

Managed Wi-Fi access and PCI scanning in a single device

AirTight Networks launched Secure Wi-Fi – a suite of managed services which adds Wi-Fi access. With today’s launch, the company offers hosted, cloud-based, secure …

NSA building one million square-foot data center

The National Security Agency and the U.S. Army Corps of Engineers broke ground on a $1.2 billion data center at Camp W.G. Williams National Guard Post. The massive, one …

Free monitoring tool for Hyper-V environments

HyperV_Mon monitors physical, logical, and virtual performance information that is available when running virtual machines under Microsoft Hyper-V. The graphical display is …

Tuesday is the most active day for threats

The most active day for threat-related traffic worldwide is Tuesday, with Monday a close second, according to a report by SonicWALL. This pattern holds true for the U.S., …

Mono ASP.NET source code disclosure vulnerability

Mono is an open source, cross-platform, implementation of C# and the CLR that is binary compatible with Microsoft.NET. A vulnerability has been reported in Mono, which can be …

Facebook closing on March 15th hoax spreads like wildfire

More than one million Facebook users are believed to have fallen for a hoax claiming that the popular website will close its doors on March 15th. A bogus news story, published …

Fwsnort: Application layer IDS/IPS with iptables

Fwsnort parses the rules files included in the Snort intrusion detection system and builds an equivalent iptables ruleset for as many rules as possible. Fwsnort utilizes the …

Spam moving to social networks and mobile

Following the recent news on global spam levels falling, Jamie Tomasello, Abuse Operations Manager at Cloudmark, outlines her thoughts on why spammers are moving from email to …

Protect USB devices against malicious content

Trend Micro announced the latest version of its USB Security product, designed to protect USB storage devices against malicious content in files that are often transferred by …

Deploy, maintain and manage data security protection

WinMagic released SecureDoc 5, the full-disk encryption solution that allows organizations to integrate data protection with existing security policies to protect sensitive …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools