software
Sophos delivers cloud-based endpoint security
Sophos announced Sophos Cloud, an easy to use security service that provides essential protection for today’s advanced threats. This first version of Sophos Cloud …
Microsoft details risks of running unsupported software
Microsoft published their Security Intelligence Report (SIR) volume 15, which analyzes threat intelligence from more than 1 billion systems worldwide to provide in-depth …
Secure corporate BYOD solution by ForeScout
ForeScout Technologies announced interoperability between ForeScout CounterACT network security and SAP Afaria mobile device management (MDM) platforms. The combination …
RSA takes a big data approach to help with high-risk threats
RSA, The Security Division of EMC, at RSA Conference Europe 2013 unveiled RSA Vulnerability Risk Management (VRM), a new software solution designed to help organizations …
Photoshop source code stolen, 38M users affected in Adobe hack
Remember the successful attack against Adobe’s networks made public earlier this month? Well, as it turns out, the damage is larger than initially thought. Early results …
WordPress 3.7 delivers important architectural updates
WordPress 3.7, named Basie, is available for download or update in your WordPress dashboard. Updates include: Updates while you sleep: With WordPress 3.7, you don’t have …
Mozilla releases add-on to reveal online data tracking
With a new version (1.0.2) released on Wednesday, Mozilla has once again put the spotlight on its Collusion add-on that aims to show users which first and third parties are …
Microsoft releases Sigcheck 2.0
Sigcheck is a command-line utility that shows file version number, timestamp information, and digital signature details, including certificate chains. Version 2.0 adds …
Secure file sharing for Mac with native OS X integration
Infrascale released FileLocker for Mac, with native OS X integration. OS X users now have direct access to File Locker’s Ultrasafe features as well as Private Cloud …
iPhone secure messaging with self-destruct mechanism via Wickr app
Wickr was one of the most interesting companies I was introduced to at this year’s RSA Conference in San Francisco. The company was one of the finalists of the …
Nmap cheat sheet
Network Mapper – better known by its shortened name Nmap – is one of the most long-lived security tools out there. Used for scanning computer networks for ports, …
Internet of Things starter kit from IBM and Libelium
IBM and Libelium released an Internet of Things Starter Kit to enable dozens of sensor applications ranging from monitoring parking spaces or air pollution to providing …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users