Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
The Tangled Web: A Guide to Securing Modern Web Applications

We all use the Internet to some extent and browsers to surf through it. With security vulnerabilities affecting them and the technologies that allow them to function popping …

The Information Diet: A Case for Conscious Consumption

As the amount of information we consume every day rises inexorably, we have to be aware that our brain is not able to store it and retrieve it like a computer. Also, that …

Seven Databases in Seven Weeks

For years, the popularity of relational databases created by Oracle, Microsoft, and IBM, and of the open source MySQL, PostgreSQL, and SQLite was undisputed. But, in time, …

Introducing Windows Server 2012

Windows Server 2012, currently available as a Release Candidate, brings forward hundreds of new features and enhancements including cloud computing, networking, storage, …

Windows Forensic Analysis Toolkit, Third Edition

As a considerable number of PC users has switched to Windows 7, Harlan Carvey has updated its popular Windows Forensic Analysis Toolkit book to cover the systems running it. …

Securing the Cloud

Cloud computing and cloud services have proliferated in the first place because of one simple reason: they lower the cost of doing business. The worrying about the security …

LOK-IT Secure Flash Drive

After a couple of years of research and development, LOK-IT was announced at the RSA Conference 2011 in San Francisco. The product boasted a unique concept of PIN-based …

Digital Forensics with Open Source Tools

Proprietary digital forensics tools have long been popular with the majority of forensic practitioners, but there are also open source ones that can come very handy. The book …

CompTIA Security+ SY0-301 Authorized Practice Questions Exam Cram (3rd Edition)

The title says it all - with over 800 practice questions, this book covers all the topics addressed in the CompTIA Security+ SY0-301 exam, and the CD allows you to experience …

Metasploit: The Penetration Tester’s Guide

Metasploit Framework (MF), the open source tool for launching exploits against remote machines, is a well-loved instrument that allows penetration testers to automate routine …

The Basics of Digital Forensics

Computers, mobile devices and the Internet have become an integral part of our daily lives. They are helpful tools, but they are also sources of information that one would not …

Low Tech Hacking: Street Smarts for Security Professionals

When talking about hacking, many of us primarily think about software vulnerabilities, exploits, malware and coding. But as social engineering began to grab headlines, the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools