Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
New Iomega eGo portable hard drives with security software

Iomega announced a new generation of the eGo portable hard drive, featuring new look USB 2.0-powered models with sruggedness and a suite of bundled data protection software, …

Red Hat Enterprise Linux 4.8 is out

Today Red Hat unveiled the eighth update to Red Hat Enterprise Linux 4. The company notes that the focus of product updates in the future will shift away from providing …

Cisco outlines strategy for highly secure Smart Grid infrastructure

Cisco today outlined its plan to deliver an end-to-end, highly secure network infrastructure solution that helps utility companies and their customers manage power supplies …

Ford debunks £10,000 Fusion Hybrid email hoax

Sophos is warning computer users not to believe everything they read in an email, following news that Ford Motor Company has been the victim of a bogus email hoax claiming the …

Microsoft releases Surface SP1

Microsoft Surface represents the next generation of customer digital interaction. There’s no mouse or keyboard, the product employs a camera-based vision system that …

Web penetration testing live CD

The Samurai Web Testing Framework is a live Linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open …

New version of DeleGate, a multi-purpose application level gateway

DeleGate is a multi-purpose application level gateway or proxy server that mediates communication of various protocols, applying cache and conversion for mediated data, …

McAfee acquires Solidcore Systems

McAfee announced a definitive agreement to acquire privately owned Solidcore Systems for approximately $33 million in cash up front and with an earn-out of up to an additional …

Strong webmail with a twist

StrongWebmail is the first email account to confirm a user’s identity using something they know (their password) and something they have (their telephone). When a person …

Cybercriminals imitating social networks to spread malware

The results of new research conducted by Websense Security Labs reveal a growing domain-name cloning trend among cybercriminals seeking to take advantage of the huge number of …

What keeps network administrators up at night

According to findings from the sixth annual “What Keeps Network Administrators Up At Night” security survey commissioned by VanDyke Software and executed by …

Telephone authentication key to increasing online consumer confidence

Telephone authentication can play a key role in increasing online transactions, boosting consumer confidence when shopping over the Internet by helping to eliminate any risk …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools