software
Splunk integrates with relational databases
Splunk announced Splunk DB Connect, which delivers scalable, real-time integration between Splunk Enterprise and traditional relational databases. With Splunk DB Connect, …
AVG CloudCare adds new email security services
AVG announced a new release of AVG CloudCare, the cloud based administration platform that allows remote deployment and management of IT and security services for SMBs. The …
Free Android malware analysis tool
Bluebox Labs announced Dexter, a free tool to help researchers and enterprise security teams analyze applications for malware and vulnerabilities. The Dexter platform provides …
Japanese student sets up free VPN service
There are a lot of people around the world that would like to bypass firewalls set up by their governments, but not everybody can afford to do it. Enter Daiyuu Nobori, a …
Microsoft continues to focus on security in their products
86% of vulnerabilities discovered in the most popular 50 programs in 2012 were in non-Microsoft (or “third-party”) programs. The result was published today in the …
Metasploit supports Kali Linux free security auditing toolkit
Rapid7 is working with Offensive Security to provide official Metasploit support for Kali Linux, the enterprise-ready evolution of BackTrack Linux. The free security auditing …
Trend Micro introduces new end user protection suite
Trend Micro announced a new suite – Trend Micro Enterprise Security and Data Protection – designed to help companies efficiently mitigate the risks of attacks and …
Improving the security for Android embedded systems
McAfee has delivered a whitelisting security solution for Android based embedded systems. McAfee Application Control for Android resides in the Android kernel, embedded in the …
Wolfgang Kandek presents new Qualys offerings
During RSA Conference 2013 in San Francisco, presented several news announcements. In this video, Qualys CTO Wolfgang Kandek discusses the expanded FreeScan service, the …
Software protects passwords via host of dummy cursors
Virtual keyboards have helped thwart keyloggers, but some danger while entering passwords still remained, as some malware is also capable of taking screenshots or even record …
Most interesting products at RSA Conference 2013
The RSA Conference held each year in San Francisco is the biggest security event in the world, attracting tens of thousands visitors and (this year) over 350 exhibitors. Not …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users