software
Secure corporate BYOD solution by ForeScout
ForeScout Technologies announced interoperability between ForeScout CounterACT network security and SAP Afaria mobile device management (MDM) platforms. The combination …
RSA takes a big data approach to help with high-risk threats
RSA, The Security Division of EMC, at RSA Conference Europe 2013 unveiled RSA Vulnerability Risk Management (VRM), a new software solution designed to help organizations …
Photoshop source code stolen, 38M users affected in Adobe hack
Remember the successful attack against Adobe’s networks made public earlier this month? Well, as it turns out, the damage is larger than initially thought. Early results …
WordPress 3.7 delivers important architectural updates
WordPress 3.7, named Basie, is available for download or update in your WordPress dashboard. Updates include: Updates while you sleep: With WordPress 3.7, you don’t have …
Mozilla releases add-on to reveal online data tracking
With a new version (1.0.2) released on Wednesday, Mozilla has once again put the spotlight on its Collusion add-on that aims to show users which first and third parties are …
Microsoft releases Sigcheck 2.0
Sigcheck is a command-line utility that shows file version number, timestamp information, and digital signature details, including certificate chains. Version 2.0 adds …
Secure file sharing for Mac with native OS X integration
Infrascale released FileLocker for Mac, with native OS X integration. OS X users now have direct access to File Locker’s Ultrasafe features as well as Private Cloud …
iPhone secure messaging with self-destruct mechanism via Wickr app
Wickr was one of the most interesting companies I was introduced to at this year’s RSA Conference in San Francisco. The company was one of the finalists of the …
Nmap cheat sheet
Network Mapper – better known by its shortened name Nmap – is one of the most long-lived security tools out there. Used for scanning computer networks for ports, …
Internet of Things starter kit from IBM and Libelium
IBM and Libelium released an Internet of Things Starter Kit to enable dozens of sensor applications ranging from monitoring parking spaces or air pollution to providing …
Facebook data mining tool uncovers your life
You know you shouldn’t post potentially damaging data on Facebook, but more often that not, your friends don’t think twice about it, and this can impact you even …
Can you trust the apps you use?
With the advent of smartphones, the word “app” has almost become a synonym for pleasure. Whatever you need, whatever you want is right there at your fingertips, …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA