software
Cuckoo Sandbox: Automated malware analysis
Cuckoo Sandbox is an open source automated malware analysis system. It started as a Google Summer of Code 2010 project with The Honeynet Project and evolved into being one of …
Security tips to stay safe this summer
PandaLabs published its security tips for consumers to stay safe this summer and avoid falling victim to computer fraud. During the summer, people (especially children) have …
Securing apps and avoiding an explosive breach
Recent research from Veracode shows that 84 percent of web applications from American public companies are at risk of being hacked, despite more stringent compliance …
RIPS: Free PHP security scanner
RIPS finds vulnerabilities in PHP applications using static code analysis. By tokenizing and parsing all source code files RIPS is able to transform PHP source code into a …
User activity monitoring for Windows and OS X
SpectorSoft released SPECTOR 360 7.4, user activity monitoring software for Mac and Windows networks. The software provides visibility into and analysis of the digital …
Secunia PSI 3.0 released
Secunia announced the availability of Secunia PSI 3.0, a free computer security scanner which identifies software applications that are insecure and in need of security …
FIPS-validated mobile VPN for iPhone and iPad
Columbitech announced the availability of the enterprise-grade mVPN Secure Browser 5.0, which supports the iPhone, iPad and iPod Touch. The browser provides secure access to …
Splunk App for Active Directory released
Splunk announced the Splunk App for Active Directory which helps enable organizations to avoid service outages and provides proactive management and compliance reporting of …
Bitdefender unveils new generation of products
Bitdefender launched Bitdefender 2013, improving and adding a whole arsenal of features to keep users safe. Bitdefender Safepay brings online banking and shopping to a whole …
DroidSheep: Android tool for session hijacking
DroidSheep is a simple Android tool for web session hijacking (sidejacking). It listens for HTTP packets sent via a wireless (802.11) network connection and extracts the …
Real-time alert system shows active cyber attacks in 3D
A solution to the problem of how to spot cyber attacks on a network as soon as they have begun might just be coming from Japan, reports DigInfo TV. Researchers from the …
HP secures the mobile workforce
HP announced new offerings to help SMBs prepare their technology infrastructures for a growing mobile workforce. With more than 1.1 billion mobile appliances in use worldwide, …
Featured news
Resources
Don't miss
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools
- Third-party cyber risks and what you can do
- Product showcase: Secure digital and physical access with the Swissbit iShield Key 2