Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Mobile screen-spy software recreates passwords

When one types text messages, emails and login credentials on one’s virtual iPhone or Android keyboard, larger bubbles containing each character pop up for a second …

New analytics advance IBM security intelligence portfolio

IBM is extending its proven security services portfolio to include enhanced analytic tools and services to provide deeper, real-time analysis of advance threats. By detecting …

IT Operations Analyzer gets expanded monitoring capabilities

Hitachi announced a new version of its IT Operations Analyzer, an integrated availability and performance monitoring tool that can help reduce complexity, streamline …

Registry Decoder: Digital registry forensics

Registry Decoder is a free and open source tool for the acquisition, analysis, and reporting of registry contents. It comes with an online acquisition component and an offline …

Norton updates Tablet Security and Mobile Security

Symantec announced Norton Tablet Security and new updates for Norton Mobile Security, including a new “Scream” feature that helps users find a lost or stolen phone …

Researchers to be rewarded for coordinating software vulnerabilities

Vulnerability researchers are being invited to participate in a new program under which Secunia, a provider of vulnerability intelligence and vulnerability management tools, …

Scan your PC for common vulnerabilities

The Secunia Online Software Inspector, or short OSI, is a fast way to scan your PC for the most common programs and vulnerabilities, thus checking if your PC has a minimum …

Fraud prevention and bot protection

Imperva announced the availability of SecureSphere 9.0 and introduced ThreatRadar Fraud Prevention Services and defined a new Web security architecture that not only …

Toolkit cracks encrypted information on iOS 5 devices

ElcomSoft updated the iOS Forensic Toolkit with iOS 5 support for recovering keychain information in iOS 5 devices. Providing near-instant forensic access to encrypted …

Secure replacement for the Certificate Authority System

Convergence is a secure replacement for the Certificate Authority System. Rather than employing a traditionally hard-coded list of immutable CAs, Convergence allows you to …

Network and security analysis with Trisul

Trisul is a new kind of network monitor that supplements fine grained traffic metering with flows, packets, and alerts. You can carry out any kind of network and security …

eFront multiple vulnerabilities

Multiple vulnerabilities have been reported in eFront, according to Secunia. These can be exploited by malicious users to conduct SQL injection attacks and compromise a …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools