software
Security software market grew 7.9% in 2012
Worldwide security software revenue totaled $19.2 billion in 2012, a 7.9 percent increase from 2011 revenue of $17.7 billion, according to Gartner, Inc. Gartner said that the …
Employees continue to use risky apps on mobile devices
Risky applications and business applications are being used side-by-side on devices owned by employees that are used for work, according to a survey by the SANS Institute. …
Parents should be concerned about app security
Veracode released an infographic outlining the importance of mobile application security for children. It provides parents with tips for protecting their children, their …
Apache server bug allows remote code execution
The existence of a “moderately critical” Apache HTTP Server vulnerability whose exploitation could allow attackers to compromise the system and execute arbitrary …
Migration and monitoring of Microsoft environments
Dell Software announced a series of new enhancements designed to help organizations optimize the migration, management and monitoring of Microsoft environments. Dell Software …
McAfee unveils Complete Endpoint Protection suites
McAfee introduced two new suites: McAfee Complete Endpoint Protection – Enterprise, and McAfee Complete Endpoint Protection – Business. The suites include McAfee …
Scanner identifies malware strains, could be future of AV
When it comes to spotting malware, signature-based detection, heuristics and cloud-based recognition and information sharing used by many antivirus solutions today work well …
Killer apps: The performance of networked applications
Ipanema Technologies and Easynet Global Services unveiled the results of Killer Apps 2013, a major study into the performance of networked applications. Networking budgets are …
Logging and Log Management
Every security practitioner should by now be aware of the overwhelming advantages of logging and perusing logs for discovering intrusions into systems. But logging and log …
Free tool repairs critical Windows configuration vulnerabilities
Tripwire announced SecureCheq, a free configuration utility that helps evaluate and repair the most common, critical configuration vulnerabilities in Windows desktops and …
Find TrueCrypt and BitLocker encrypted containers and images
Passware announced that Passware Kit Forensic 12.5 can now recognize hard disk images and containers, such as TrueCrypt, BitLocker, PGP, during a computer scan. For a computer …
Sourcefire goes beyond the sandbox
Sourcefire introduced malware trajectory capabilities across its Advanced Malware Protection portfolio, giving customers visibility into malware attack activity and enabling …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users