Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
JScript scripting engine critical vulnerability

Microsoft released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a …

fwknop 1.9.12 released

fwknop stands for the “FireWall KNock OPerator”, and implements an authorization scheme called Single Packet Authorization (SPA). This method of authorization is …

Real-time alerting and advanced mapping capabilities for host level devices

Lumeta announced the latest release of IPsonar, a comprehensive network discovery and network mapping solution for large organizations. This latest release includes …

New backwards-compatible Intel Core 2 Quad PICMG 1.0 SBC

Portwell has launched its new ROBO-8779VG2A, an Intel Core 2 Quad/Core 2 Duo/ Celeron processor-based PICMG 1.0 SBC with DDR3 SDRAM, VGA, DVI, Dual Gigabit Ethernet, Audio and …

Time stamping security appliance from Thales

Thales announces version 5 of Thales Time Stamp Server, allowing customers to time stamp electronic records and application software with an even higher level of security and …

Aircrack-ng 1.0 released

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along …

Automated lock down for Red Hat Enterprise Linux on IBM’s System z

Trusted Computer Solutions announced that Security Blanket, the company’s automated lock down solution, is now available for Red Hat Enterprise Linux 5 operating systems …

Low power load switch for biometric devices

Advanced Analogic Technologies introduced the AAT4702, a highly integrated load switch that requires half the board footprint of discrete alternatives and consumes a 15 …

Is it possible for data to be both anonymous and useful?

The hoarding of data by companies is usually accompanied by the assurance that all the obvious identifiers (name, address, Social Security number) have been deleted – …

Cyber security exercises prepare you to deal with security threats

Cyber security attacks against public and private information technology and networks are escalating in occurrence and complexity. Those intent on causing harm never cease in …

Gemalto acquires Trusted Logic

Gemalto announced that it has completed the acquisition of Trusted Logic from its founders and other shareholders. Gemalto, which already held 32% of the shares, aims with …

Microsoft releases five security bulletins for Windows

It’s time for a summer Patch Tuesday and Microsoft delivers a variety of patches that fix vulnerabilities targeting Windows. Vulnerability in JScript scripting engine …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools