software
Modeling, customizing, and automating applications with AWS OpsWorks
Amazon Web Services launched AWS OpsWorks, an application management solution for the complete lifecycle of complex applications, including resource provisioning, …
Antibot: Network-based botnet removal tool
Botnets are flourishing with new packaging, new methods and new business models. ZeroAccess, the world’s fastest-growing botnet, infected millions of computers in 2012, …
BlackBerry Enterprise Server can be compromised due to TIFF-processing vulnerabilities
BlackBerry has released details about two critical vulnerabilities that can allow attackers to access and execute code on systems running BlackBerry Enterprise Server. The …
SmartShare: Free tool for secure social sharing
Veracode released SmartShare, a free tool designed to offer developers, bloggers and marketers a more secure method of on-site bookmark sharing. With more online content being …
CA streamlines identity and access management
CA announced its CA CloudMinder identity and access management (IAM) service solution. CA CloudMinder provides enterprise-grade IAM for both cloud-based or on-premise …
Zscaler delivers big visibility security analytics
Zscaler unveiled new analytics technology that gives enterprise security professionals real-time visibility into all employee internet activity across web, cloud email, and …
McAfee delivers unified rapid-response security management
McAfee is raising the bar on intelligent threat identification, time to respond and robust, unified security management with the latest updates to its security management …
Opportunistic scanning from cloud to endpoint
iScan Online introduces opportunistic security scanning from the cloud to any device. They perform internal PAN, PCI and Vulnerability scanning without installing software or …
Unintended, malicious and evil applications of augmented reality
Most new products begin life with a marketing pitch that extols the product’s virtues. A similarly optimistic property holds in user-centered design, where most books …
Privacy and security incident management for healthcare
A lost laptop or lost paper files can put a healthcare organization in a tailspin, especially if they contain the protected health information (PHI) of thousands of patients. …
F-Secure Client Security updated with threat detection technology
As the cost of cybercrime continues to soar, affecting businesses around the world, F-Secure is introducing the latest version of its corporate endpoint security product, …
Banking Trojan posing as Avast AV
A banking Trojan masquerading as the popular free AV solution from Avast has been spotted on computers of Brazilian users, reports Kaspersky Lab Expert Dmitry Bestuzhev. The …