Please turn on your JavaScript for this page to function normally.
Sophos delivers cloud-based endpoint security

Sophos announced Sophos Cloud, an easy to use security service that provides essential protection for today’s advanced threats. This first version of Sophos Cloud …

Microsoft details risks of running unsupported software

Microsoft published their Security Intelligence Report (SIR) volume 15, which analyzes threat intelligence from more than 1 billion systems worldwide to provide in-depth …

Secure corporate BYOD solution by ForeScout

ForeScout Technologies announced interoperability between ForeScout CounterACT network security and SAP Afaria mobile device management (MDM) platforms. The combination …

RSA takes a big data approach to help with high-risk threats

RSA, The Security Division of EMC, at RSA Conference Europe 2013 unveiled RSA Vulnerability Risk Management (VRM), a new software solution designed to help organizations …

Photoshop source code stolen, 38M users affected in Adobe hack

Remember the successful attack against Adobe’s networks made public earlier this month? Well, as it turns out, the damage is larger than initially thought. Early results …

WordPress 3.7 delivers important architectural updates

WordPress 3.7, named Basie, is available for download or update in your WordPress dashboard. Updates include: Updates while you sleep: With WordPress 3.7, you don’t have …

Mozilla releases add-on to reveal online data tracking

With a new version (1.0.2) released on Wednesday, Mozilla has once again put the spotlight on its Collusion add-on that aims to show users which first and third parties are …

Microsoft releases Sigcheck 2.0

Sigcheck is a command-line utility that shows file version number, timestamp information, and digital signature details, including certificate chains. Version 2.0 adds …

Secure file sharing for Mac with native OS X integration

Infrascale released FileLocker for Mac, with native OS X integration. OS X users now have direct access to File Locker’s Ultrasafe features as well as Private Cloud …

iPhone secure messaging with self-destruct mechanism via Wickr app

Wickr was one of the most interesting companies I was introduced to at this year’s RSA Conference in San Francisco. The company was one of the finalists of the …

Nmap cheat sheet

Network Mapper – better known by its shortened name Nmap – is one of the most long-lived security tools out there. Used for scanning computer networks for ports, …

Internet of Things starter kit from IBM and Libelium

IBM and Libelium released an Internet of Things Starter Kit to enable dozens of sensor applications ranging from monitoring parking spaces or air pollution to providing …

Don't miss

Cybersecurity news