software
UEFI secure boot: Next generation booting or a controversial debate
One of the first initiatives for secure booting has been the Unified Extensible Firmware Interface (UEFI) Initiative. UEFI is a superior replacement of the Basic Input Output …
Free malware removal tool gets new features
The fourth generation of Emsisoft Emergency Kit is now available. It now boasts an improved cleaning function for the removal of malicious software. And at the same time it …
EMC releases array of new products
EMC announced new hardware and software products that enable customers to deploy new Protection Storage Architectures that address today’s and tomorrow’s data …
Bluebox releases free scanner for Android “master key” bug
Bluebox Security, the mobile security startup that’s “working to save the world from information thievery”, has made a name for itself by finding and …
Metaforic released secure cryptography solution WhiteBox
Metaforic announced the general release of WhiteBox, a secure cryptography solution for mobile financial, conditional access, BYOD and embedded communications and payments. …
SaaS enhanced mobile device security
Sophos announced Sophos Mobile Control 3.5, the latest version of its mobile device management (MDM) solution. Available both on-premise and as-a-service, Sophos Mobile …
Neurotechnology updates entire biometric product line
Neurotechnology announced new releases across their entire line of biometric SDKs, including: MegaMatcher 4.5 multi-biometric SDK for large-scale applications, VeriFinger 6.7 …
Pirate Bay founder raising money for new encrypted messaging app
Peter Sunde, one of the Pirate Bay co-founders, is looking to enter the encrypted messaging market. Spurred by the recent revelations about the US government’s PRISM …
Network Intrusion Analysis
What happens after a network intrusion is detected? What steps do you need to take? What is the proper way to react in a specific situation? The authors say their intention …
StealthWatch gets enhanced threat detection
Lancope released the latest version of its StealthWatch flow-based monitoring system to enable faster, more effective threat detection and incident response. With StealthWatch …
App turns a mobile device into a personal authenticator
Passwords are at the root of online security problems because when typed into browsers, sent over open networks and centrally stored, they are easily compromised leaving the …
Audit privileged access to Microsoft Online Services
Xceedium announced Xsuite will include protection for Office 365, Exchange, Lync, and SharePoint. The additional protection for Microsoft online services complements …