Please turn on your JavaScript for this page to function normally.
How to avoid malware hiding behind QR codes

As the use of QR codes becomes increasingly widespread, users should be aware that they are also becoming an easy way for malware peddlers to spread their malicious wares. …

Syncplicity launches Security and Compliance Console

With Syncplicity, users get their own secure Virtual Private Cloud where they use the applications, files and folders they are used to. With the File changes, no matter where …

Carrier IQ bug did allow some SMS recording

Carrier IQ, the mobile analytics company that has lately been in the midst of a battle to prove that their CarrierIQ software didn’t log private information, has …

Mobile VPN client for Android

Columbitech released a mobile VPN client for Android 4.0, available for free download from Android Market. The security level of the Columbitech MVPN is designed for …

Managing firewalls in virtual environments

AlgoSec announced the ia solution for managing firewalls in virtual environments. AlgoSec Security Management Suite simplifies hypervisor-level firewall management by …

Tips to stay protected online

Now more than ever before, computer users need to take measures to protect themselves online, and choosing the right antivirus software is a key step in defending against …

Download.com “cleans up” Nmap but not other downloads

When he discovered that Nmap was being distributed by C|Net’s Download.com site bundled up with a proprietary trojan installer that installed a sketchy toolbar, changed …

OpenDNS tool secures DNS traffic

OpenDNS unveiled a preview of DNSCrypt, a new technology that improves both the security and privacy of Internet users, particularly those on unsecured wireless hotspots and …

Free tool exploits SQL injection vulnerabilities

NT OBJECTives announced NTO SQL Invader, a free tool which provides pen testers and developers the ability to quickly and easily exploit and demonstrate SQL Injection …

Tips for securing Internet connected devices

From the hottest new tablet to sleek smartphones and laptops, electronic devices are likely at the top of many consumers’ holiday wish lists this year. Many lucky …

Free data loss prevention tool for enterprise IT

STEALTHbits released of DLP Lite for File Systems, a free, regex DLP tool that aids organizations in identifying high-risk, unsecured content on their networks to mitigate the …

8 out of 10 applications fail to meet security standards

Considered “low hanging fruit” because of their prevalence in software applications, XSS and SQL Injection are two of the most frequently exploited …

Don't miss

Cybersecurity news