Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Freeware network discovery and IP address management tool

The Infoblox IPAM freeware application replaces manual processes, custom scripts, and spreadsheets with out-of-the-box automation and graphical tools for monitoring and …

Vulnerability and potential exploit in Cisco WLAN access points

The AirMagnet Intrusion Research Team has uncovered a new wireless vulnerability and potential exploit associated with Cisco wireless LAN infrastructure. The vulnerability …

Cisco doubles density of high-performance edge router

Cisco announced it is doubling the density of its flagship edge router, the Cisco Aggregation Services Router 9000 Series. Also introduced is a new single-slot 16 x 10 Gigabit …

GPS child tracking device from Amber Alert

Amber Alert GPS today launched the Amber Alert GPS 2G, a child tracking device enabling parents to always know where their children are. Amber Alert GPS 2G gives parents the …

Video: Web application scanning with Nessus

Scanning web applications with Nessus offers the end user several new configuration options in the Nessus client. You should take into account: Number of web servers and …

Defunct company forbidden to sell customer’s biometric data

Wired reports that Clear, one of the 7 companies that have been approved by the Transportation Security Administration and that provided the service of helping passengers get …

Video: Tor and nmap with tortunnel

In the video below we look at how you can preform a port scan through a tor network by jumping to the exit node with Moxie’s excellent tortunnel tool. We also look at …

New variant of the OSX_JAHLAV malware in the wild

Trend Micro researcher Ivan Macalintal, discovered another variant of the JAHLAV family: OSX_JAHLAV.I affecting Mac OS X. Once again, this malware comes in the form of a …

Military server compromised

The Boston Globe reports that a random online search for software revealed a serious security breach into the servers of the Reserve Officers’ Training Corps (ROTC) at …

A rising threat: Real-time keyloggers

According to Saul Hansell, a NY Times blogger, attackers have improved keylogging software by making it able to report your login credentials in real time via a Twitter-like …

It’s official: Mac OS X 10.6 Snow Leopard available on August 28th

Apple today included a pre-order of Mac OS X 10.6 Snow Leopard on the Apple Store and Amazon.com has it in stock as well. To the delight of Mac users, this proves that the …

The crime organizations behind most cyber criminal activity

Money makes the world go around. Those who don’t have it, want it, and those who have it – want more of it. Organized crimes operations are know for their …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools