Please turn on your JavaScript for this page to function normally.
Hacktivists are “villains”, say IT security pros

The majority of IT security professionals have – unsurprisingly – a negative opinion of “hacktivists”, say the results of a survey of 211 attendees at …

Amazon extends cloud access, enables “identity federation” for accessing it

Amazon Web Services has extended Amazon Virtual Private Cloud (Amazon VPC) to all AWS Regions, allowing enterprises to launch their Amazon VPC environments in the US East and …

Scanning thousands of Web apps in days, not months

Faced with the reality that exploiting a single SQL Injection vulnerability or cross-site scripting (XSS) error in any web application could take down an organization’s …

Penetration testing for mobile phones

Core Security announced the Core Impact Pro v12 penetration testing software, a commercial-grade solution that pinpoints security exposures in Android, BlackBerry and iPhone …

Free password reset self service solution for SMBs

Nervepoint Technologies announces the launch of Access Manager Self Service, a free Password Self Service solution for SMBs. With almost zero-configuration, the service …

Web application security on a new level

Qualys announced QualysGuard WAS 2.0, enabling organizations to leverage the power and scalability of the cloud to discover, catalogue and scan large numbers of web …

Automated malware analysis for businesses

GFI released GFI SandBox 3.4 (formerly CWSandBox), the latest update to their malware analysis tool that helps security professionals assess suspected files and URLs for …

Virtualized scanners and report customization for security assessment

Qualys announced a new edition of the QualysGuard Consultant service, featuring virtualized scanner appliances (vScanners) and a report customization module. The new edition …

Context-based Web UI ushers in Qualys’ new SaaS platform

Qualys showcased its new UI for the QualysGuard IT Security and Compliance SaaS Suite, now available in beta for all customers. The new context-based UI features interactive …

Microsoft offers $250,000 prize for innovative security technology

Microsoft may not believe in bug bounties, but it’s not adverse to paying for knowledge when it comes to ingenious defensive solutions. The company’s Trustworthy …

An epidemic of security worst practices

The majority of organizations fail to adhere to simple data protection standards and, in many cases, are fully unaware of what security practices are currently in place, …

Mobile threats soared in past six months

Mobile malware has increased significantly, and Android users are two-and-a-half times as likely to encounter malware today than just six months ago, says Lookout. Based on …

Don't miss

Cybersecurity news