Please turn on your JavaScript for this page to function normally.
Major pitfalls involving vulnerability scanners

While 92 percent of companies have a vulnerability management program in place, nearly half consider their networks to range from “somewhat” to …

Trojan found being offered on Google Play for weeks

Symantec researchers have recently discovered Android malware being offered on Google Play, posing as legitimate game apps “Super Mario Bros.” and “GTA 3 …

Websense TRITON now with new malware and data theft defenses

Websense announced 10 new malware and data theft defenses, spear phishing protection with cloud sandboxing, and a forensic reporting dashboard with security intelligence. With …

WatchGuard updates XTM operating system

WatchGuard unveiled the latest release of the operating system that forms the backbone of WatchGuard XTM security solutions – WatchGuard Fireware XTM 11.6. In …

Free tool protects Internet connections from DNS Changer shutdown

Bitdefender released a tool to prevent computer users worldwide infected with DNS Changer malware from losing their internet connection on July 9th. The U.S. Federal Bureau of …

Open source IDS Suricata 1.3 released

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. Several characteristics of …

Enterprise log managers: An unsexy but vital tool

Ultimately, the goal of Enterprise Log Management (ELM) is to get your most critical events escalated to your operations staff to react and respond with the appropriate …

Cuckoo Sandbox: Automated malware analysis

Cuckoo Sandbox is an open source automated malware analysis system. It started as a Google Summer of Code 2010 project with The Honeynet Project and evolved into being one of …

Security tips to stay safe this summer

PandaLabs published its security tips for consumers to stay safe this summer and avoid falling victim to computer fraud. During the summer, people (especially children) have …

Securing apps and avoiding an explosive breach

Recent research from Veracode shows that 84 percent of web applications from American public companies are at risk of being hacked, despite more stringent compliance …

RIPS: Free PHP security scanner

RIPS finds vulnerabilities in PHP applications using static code analysis. By tokenizing and parsing all source code files RIPS is able to transform PHP source code into a …

User activity monitoring for Windows and OS X

SpectorSoft released SPECTOR 360 7.4, user activity monitoring software for Mac and Windows networks. The software provides visibility into and analysis of the digital …

Don't miss

Cybersecurity news