scanning
Free mobile security scanning apps and SDK
iScan Online announced an updated and enhanced suite of security scanning services. iScan Online Mobile for iOS – This app provides security scanning for iPhone and iPad …
Nmap cheat sheet
Network Mapper – better known by its shortened name Nmap – is one of the most long-lived security tools out there. Used for scanning computer networks for ports, …
Rapid7 offers free tools and terabytes of its own research
HD Moore, chief research officer at Rapid7, has called for all security professionals to collaborate on security data research and analysis to create greater awareness and …
GFI LanGuard 2014 released
GFI Software released GFI LanGuard 2014. The newest version now features vulnerability assessment for mobile devices, including tablets and smartphones, running the mobile …
Tenable release Passive Vulnerability Scanner 4.0
Tenable Network Security’s Passive Vulnerability Scanner (PVS) 4.0 is now generally available as a standalone product. Already available as part of Tenable’s …
Secunia CSI 7.0 released
Secunia released Secunia Corporate Software Inspector 7.0, which introduces new features and improvements for vulnerability and patch management. The foundation of the Secunia …
Nmap 6.40 released
Nmap is a free and open source utility for network exploration or security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the …
Scanning the Internet in less than an hour
Scanning the Internet used to be a task that took months, but a new tool created by a team of researchers from the University of Michigan can scan all (or most) of the …
Blue Coat Internet monitoring devices (mis)used in Iran, Syria, Sudan
Even though US sanctions should have made it impossible, filtering and Internet monitoring devices by US-based Blue Coat Systems can be found on many computer networks in …
Automated analysis of essential security controls
EiQ Networks announced ThreatVue, an out-of-the-box security monitoring solution that automates the implementation, analysis and remediation guidance of essential security …
Researcher ropes poorly protected devices into botnet to map the Internet
A fascinating but technically illegal experiment conducted by an anonymous researcher has witnessed over 420,000 Internet-connected devices being roped into a botnet that …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD