Help Net Security
Contrast security plugin invisibly monitors applications during testing
Aspect Security announced Contrast, an application security service that creates a real-time dashboard of intelligence and vulnerabilities. Contrast is an IAST solution, …
Tool prevents hackers from obtaining Android app source code
RIIS announced HoseDex2Jar, a mobile security tool that can prevent Android decompilation by hackers on mobile devices. Android runs applications in .dex format. Dex2Jar is …
New wireless APs and 2-factor authentication products from Fortinet
Fortinet announced four new wireless access points along with three new two-factor authentication products. Fortinet is introducing four new additions to its wireless access …
Oracle releases MySQL 5.6 RC
Oracle announced the availability of the Release Candidate for MySQL 5.6, the popular open source database. MySQL 5.6 RC provides enhanced linear scalability, helping users to …
Interesting times for information security professionals
There is an old saying, which some attribute as an old Chinese proverb, that states “May you live in interesting times.” Some say that this is a blessing you may …
HD Moore: The wild west
HD Moore is the CSO of Rapid7 and Chief Architect of Metasploit. In the video below, recorded at Derbycon last week in Kentucky, he talks about ghost towns, highways, and …
Coverity releases development testing platform
Coverity announced the next generation of its Coverity Development Testing Platform, an integrated suite of software testing technologies for identifying and remediating …
Adobe unveils Acrobat XI with cloud services
Adobe unveiled Adobe Acrobat XI software with cloud services, a new solution that features newly integrated cloud services, including Web contracting with Adobe EchoSign and …
Steganos Password Manager 14 released
Steganos Software announced the availability of Steganos Password Manager 14. Designed for individuals who want to want to securely store all of their account log-in …
Information Systems for Managers: Text & Cases, 2nd Edition
Information Systems for Managers is a text for MBA and other managerially-oriented courses on Information Systems. As with the first edition, the main focus of the book is on …
Week in review: Malware served form SourceForge mirror, Adobe breach and compromised certificate
Here’s an overview of some of last week’s most interesting news, interviews, videos and articles: Facebook turns off facial recognition in Europe Facebook has …
L0phtCrack 6
L0phtCrack 6 is the award-winning password audit and recovery tool for Windows and Unix passwords. L0phtCrack 6 is packed with powerful features such as scheduling, hash …
Featured news
Resources
Don't miss
- Attackers turn trusted OAuth apps into cloud backdoors
- Life, death, and online identity: What happens to your online accounts after death?
- OpenFGA: The open-source engine redefining access control
- For blind people, staying safe online means working around the tools designed to help
- 3 DevOps security pitfalls and how to stay ahead of them