The Hacker News Logo
Subscribe to Newsletter

The Hacker News - Cybersecurity News and Analysis: Security tools

4 Best Free Online Security Tools for SMEs in 2020

4 Best Free Online Security Tools for SMEs in 2020

November 14, 2019The Hacker News
Cyberattacks on small and midsized companies in 2019 cost $200,000 per company on average, mercilessly putting many of them out of busin...
Facebook releases Osquery Security Tool for Windows

Facebook releases Osquery Security Tool for Windows

September 27, 2016Swati Khandelwal
OSquery , an open-source framework created by Facebook that allows organizations to look for potential malware or malicious activity on t...
How To Keep Your Android Phone Secure

How To Keep Your Android Phone Secure

February 26, 2016Swati Khandelwal
As the number of threats is on the rise, Android platform is no longer safe, which isn't a surprise to anyone. Most of us are us...
How to Manage Android App Permissions to Protect Your Privacy

How to Manage Android App Permissions to Protect Your Privacy

June 22, 2015Wang Wei
Do you actually read the list of permissions that Android apps are asking for before you install them? I know most of us treat those...
Data Loss Prevention – Log & Event Manager

Data Loss Prevention – Log & Event Manager

January 14, 2015Wang Wei
In today's world your network is subject to a multitude of vulnerabilities and potential intrusions and it seems like we see or hear of ...
Log and Event Manager now with File Integrity Monitoring

Log and Event Manager now with File Integrity Monitoring

December 16, 2014Wang Wei
Security pros everywhere rely on SolarWinds Log & Event Manager for powerful, affordable, and efficient Security Information and Event...
NSA-Proof "Blackphone" Gets Rooted Within 5 Minutes

NSA-Proof "Blackphone" Gets Rooted Within 5 Minutes

August 11, 2014Wang Wei
The ultra secure NSA-Proof Blackphone titled as, " world's first Smartphone which places privacy and control directly in the hands of it...
Warning — Zero-Day Vulnerabilities Identified in Tails Operating System

Warning — Zero-Day Vulnerabilities Identified in Tails Operating System

July 23, 2014Mohit Kumar
The critical zero-day security flaws has been discovered in the privacy and security dedicated Linux-based operating system " Tails " th...
Beware Of Fake 'HeartBleed Bug Remover Tool', Hijacks System with Malware

Beware Of Fake 'HeartBleed Bug Remover Tool', Hijacks System with Malware

May 28, 2014Wang Wei
I am considering that you all must have read my last article on OpenSSL Heartbleed , a critical bug in the OpenSSL's implementation ...
Learn How SolarWinds Log & Event Manager (LEM) helps you to keep your Network Secure

Learn How SolarWinds Log & Event Manager (LEM) helps you to keep your Network Secure

March 15, 2014Swati Khandelwal
So, How do you currently monitor your logs and events, including network, servers, databases, applications, your router, firewall or Win...
AlienVault Unified Security Management: Real-Time Threat Detection Starting on Day 1

AlienVault Unified Security Management: Real-Time Threat Detection Starting on Day 1

March 14, 2014Swati Khandelwal
IT Infrastructure of organizations is growing ever more distributed, complex and difficult to manage. To manage such networks, a log man...
PREC Tool prevents Android Device from Root Exploit hidden in Malicious apps

PREC Tool prevents Android Device from Root Exploit hidden in Malicious apps

March 08, 2014Mohit Kumar
Smartphones are always ready to connect to the Internet and contains sensitive information such as Contacts, SMS, Photos, and GPS inform...
Exclusive Deals

Cybersecurity Newsletter — Stay Informed

Sign up for cybersecurity newsletter and get latest news updates delivered straight to your inbox daily.