The Hacker News — Most Popular Cyber Security, Hacking News Site: Search results for security

Microsoft built its own custom Linux OS to secure IoT devices

Microsoft built its own custom Linux OS to secure IoT devices

April 17, 2018Swati Khandelwal
Finally, it's happening. Microsoft has built its own custom Linux kernel to power " Azure Sphere ," a newly launched tech...
Online CISSP Certification Training Course — Learn from Experts

Online CISSP Certification Training Course — Learn from Experts

August 10, 2017Exclusive Deals
If you dream of making it big in the IT security community, the CISSP certification is a necessary milestone. Certified Information Sys...
Get 9 Popular Online Hacking Training Course Package for Just $49

Get 9 Popular Online Hacking Training Course Package for Just $49

April 13, 2017Exclusive Deals
Since the Internet is filled with hackers and cyber criminals keen on hacking networks for valuable information, ethical hackers are in huge...
Linux Subsystem on Windows 10 Allows Malware to Become Fully Undetectable

Linux Subsystem on Windows 10 Allows Malware to Become Fully Undetectable

September 12, 2017Swati Khandelwal
Microsoft has been expressing its love for Linux for almost three years now, and this love costs Microsoft an arm and a leg. Last year,...
Facebook Adds FIDO U2F Security Keys Feature For Secure Logins

Facebook Adds FIDO U2F Security Keys Feature For Secure Logins

January 27, 2017Mohit Kumar
Hacking password for a Facebook account is not easy, but also not impossible. We have always been advising you to enable two-factor aut...
Firewall Bursting: A New Approach to Better Branch Security

Firewall Bursting: A New Approach to Better Branch Security

December 18, 2017Wang Wei
One of the most common network security solutions is the branch firewall. Branch firewall appliances can pack into a single device a wide...
Secdo Automates End-to-End Incident Response with Preemptive IR

Secdo Automates End-to-End Incident Response with Preemptive IR

March 07, 2017Mohit Kumar
As vast volumes of digital data are created, consumed and shared by companies, customers, employees, patients, financial institutions, gover...
Microsoft Releases 4 Security Updates — Smallest Patch Tuesday Ever!

Microsoft Releases 4 Security Updates — Smallest Patch Tuesday Ever!

January 10, 2017Swati Khandelwal
In Brief Microsoft has issued its first Patch Tuesday for 2017 , and it's one of the smallest ever monthly patch releases for the ...
Wi-Fi Alliance launches WPA3 protocol with new security features

Wi-Fi Alliance launches WPA3 protocol with new security features

January 09, 2018Mohit Kumar
The Wi-Fi Alliance has finally announced the long-awaited next generation of the wireless security protocol—Wi-Fi Protected Access (WPA3...
Donald Trump appoints a CyberSecurity Advisor Whose Own Site is Damn Vulnerable

Donald Trump appoints a CyberSecurity Advisor Whose Own Site is Damn Vulnerable

January 12, 2017Mohit Kumar
Former New York City Mayor Rudolph W. Giuliani has been appointed as a cyber security advisor for the President-elect Donald Trump, but...
Learn Ethical Hacking — Get 8 Online Courses For Just $29

Learn Ethical Hacking — Get 8 Online Courses For Just $29

October 17, 2017Exclusive Deals
With the rise in cyber-crimes, ethical hacking has become a powerful strategy in the fight against online threats. In general terms, et...
Hands-On Review: Converged Networking and Security with Cato Networks

Hands-On Review: Converged Networking and Security with Cato Networks

May 08, 2017Mohit Kumar
Nobody likes to do router and firewall management. It often requires a lot of hard labor just keeping the infrastructure up and running. ...