software
Nessus 5.0 vulnerability scanner released
Tenable Network Security announced Nessus 5.0, a vulnerability and configuration assessment solution for enterprises and security professionals. Nessus 5.0 delivers introduces …
Trend Micro secures PlayStation Vita gamers
Trend Micro extended its collaboration with Sony and is now offering two web security services – “Trend Micro Kids Safety” and “Trend Micro Web …
Protect data by finding forgotten databases
Application Security declared that organizations can no longer afford to guess or assume that they have their database inventory under control. Based on the premise that you …
Web filtering technology with next-generation firewall capabilities
Barracuda Networks announced the integration of the Barracuda NG Firewall and Barracuda Web Security Flex. This solution combines cloud-based Web filtering technology with …
Open source password manager gets two-factor authentication
Yubico announced a successful implementation of YubiKey two-factor authentication with the free, open source password manager software Password Safe. The joint solution offers …
Citrix releases open source cloud platform
Today Citrix announced the availability of Citrix CloudStack 3, the first release of the open source cloud platform under the Citrix brand. CloudStack is already the …
Kaspersky Lab unveils virtualization security solution
Kaspersky Lab announced Kaspersky Security for Virtualization, focused on protecting evolving corporate IT infrastructures from malware and cybercriminals. The solution …
Apple iWork passwords cracked
ElcomSoft can now recover passwords protecting Apple iWork documents. This makes Distributed Password Recovery the first tool to recover passwords for Numbers, Pages and …
Web app security scanner Netsparker 2.1 released
Netsparker can crawl, attack and identify vulnerabilities in all custom web applications regardless of the platform and the technology it’s built on, just like an actual …
Faronics Anti-Virus 3.0 released
Faronics Anti-Virus 3.0 includes Process Protection to defend against attacks at the application level, as well as an IDS that has the ability to write rules for zero day …
Satellite telephony encryption cracked
Satellite telephony was thought to be secure against eavesdropping. Researchers at the Horst G?¶rtz Institute for IT-Security (HGI) at the Ruhr University Bochum (RUB) have …
Security architecture for trusted execution environments
Elliptic Technologies introduced the tVault Security Architecture – a technology that enables end-to-end security in connected devices. tVault provides robust security …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)