software
Major pitfalls involving vulnerability scanners
While 92 percent of companies have a vulnerability management program in place, nearly half consider their networks to range from “somewhat” to …
Trojan found being offered on Google Play for weeks
Symantec researchers have recently discovered Android malware being offered on Google Play, posing as legitimate game apps “Super Mario Bros.” and “GTA 3 …
Websense TRITON now with new malware and data theft defenses
Websense announced 10 new malware and data theft defenses, spear phishing protection with cloud sandboxing, and a forensic reporting dashboard with security intelligence. With …
WatchGuard updates XTM operating system
WatchGuard unveiled the latest release of the operating system that forms the backbone of WatchGuard XTM security solutions – WatchGuard Fireware XTM 11.6. In …
Free tool protects Internet connections from DNS Changer shutdown
Bitdefender released a tool to prevent computer users worldwide infected with DNS Changer malware from losing their internet connection on July 9th. The U.S. Federal Bureau of …
Open source IDS Suricata 1.3 released
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. Several characteristics of …
Enterprise log managers: An unsexy but vital tool
Ultimately, the goal of Enterprise Log Management (ELM) is to get your most critical events escalated to your operations staff to react and respond with the appropriate …
Cuckoo Sandbox: Automated malware analysis
Cuckoo Sandbox is an open source automated malware analysis system. It started as a Google Summer of Code 2010 project with The Honeynet Project and evolved into being one of …
Security tips to stay safe this summer
PandaLabs published its security tips for consumers to stay safe this summer and avoid falling victim to computer fraud. During the summer, people (especially children) have …
Securing apps and avoiding an explosive breach
Recent research from Veracode shows that 84 percent of web applications from American public companies are at risk of being hacked, despite more stringent compliance …
RIPS: Free PHP security scanner
RIPS finds vulnerabilities in PHP applications using static code analysis. By tokenizing and parsing all source code files RIPS is able to transform PHP source code into a …
User activity monitoring for Windows and OS X
SpectorSoft released SPECTOR 360 7.4, user activity monitoring software for Mac and Windows networks. The software provides visibility into and analysis of the digital …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users