Please turn on your JavaScript for this page to function normally.
Free smart search-engine for log data

Prism Microsystems unveiled EventTracker PULSE, a smart search-engine for log data that provides system administrators with network-wide insight for optimizing IT performance, …

New version of OSSEC host based IDS

Last week, a new version of OSSEC open source Host-based Intrusion Detection System was released. New 2.0 version is the first one with support for agentless monitoring and …

Google NativeClient Security contest

Do you think it is impossible to safely run untrusted x86 code on the web? Do you want a chance to impress a panel of some of the top security experts in the world? Then …

Video: Hiding Meterpreter with IExpress

This video by Rob Fuller demonstrates how to make running an executable less suspicious for the victim. Driving home the point that one should not run programs that you …

Increased VoIP quality and security with new MPLS offering

MegaPath announced its new Duet with MPLS and Managed Security service, providing high-quality voice combined with data security and performance. It allows customers to …

Central configuration and managing of application privileges

Avecto released Privilege Guard 2.0, which includes full integration with Active Directory Group Policy, enabling central configuration and managing of application privileges …

Innovative iris recognition system from AOptix

AOptix Technologies announced the release of InSight, their iris recognition system. The InSight, which operates at a nominal 2 meter stand-off distance, employs the …

Appliance to reduce WAN costs with secure Internet connections

Blue Coat Systems presented the ProxyAV 210, an appliance for optimizing WAN resources by enabling secure direct Internet connections to branch offices. It eliminates the cost …

VideoPlay adware infections grew 400% in February through malicious use of Web 2.0 pages

PandaLabs detected more than 400% more examples of the adware VideoPlay in February than in January. The main reason for this is the use of popular Web 2.0 sites such as …

Legitimate websites to feel Conficker worm’s impact

Sophos is warning computer users and website administrators to be vigilant this month as the Conficker worm is predicted to hit several legitimate sites, including Texan …

High-performance, exceptionally small computer from Marvell

Marvell announced its Plug Computing initiative to make high-performance, always on, always connected, and environmentally friendly computing readily available for developers …

Free software for cloud computing security

Third Brigade released Third Brigade VM Protection, a free software for cloud computing security for VMware infrastructure-based private cloud environments, vCloud service …

Don't miss

Cybersecurity news