software
How to avoid malware hiding behind QR codes
As the use of QR codes becomes increasingly widespread, users should be aware that they are also becoming an easy way for malware peddlers to spread their malicious wares. …
Syncplicity launches Security and Compliance Console
With Syncplicity, users get their own secure Virtual Private Cloud where they use the applications, files and folders they are used to. With the File changes, no matter where …
Carrier IQ bug did allow some SMS recording
Carrier IQ, the mobile analytics company that has lately been in the midst of a battle to prove that their CarrierIQ software didn’t log private information, has …
Mobile VPN client for Android
Columbitech released a mobile VPN client for Android 4.0, available for free download from Android Market. The security level of the Columbitech MVPN is designed for …
Managing firewalls in virtual environments
AlgoSec announced the ia solution for managing firewalls in virtual environments. AlgoSec Security Management Suite simplifies hypervisor-level firewall management by …
Tips to stay protected online
Now more than ever before, computer users need to take measures to protect themselves online, and choosing the right antivirus software is a key step in defending against …
Download.com “cleans up” Nmap but not other downloads
When he discovered that Nmap was being distributed by C|Net’s Download.com site bundled up with a proprietary trojan installer that installed a sketchy toolbar, changed …
OpenDNS tool secures DNS traffic
OpenDNS unveiled a preview of DNSCrypt, a new technology that improves both the security and privacy of Internet users, particularly those on unsecured wireless hotspots and …
Free tool exploits SQL injection vulnerabilities
NT OBJECTives announced NTO SQL Invader, a free tool which provides pen testers and developers the ability to quickly and easily exploit and demonstrate SQL Injection …
Tips for securing Internet connected devices
From the hottest new tablet to sleek smartphones and laptops, electronic devices are likely at the top of many consumers’ holiday wish lists this year. Many lucky …
Free data loss prevention tool for enterprise IT
STEALTHbits released of DLP Lite for File Systems, a free, regex DLP tool that aids organizations in identifying high-risk, unsecured content on their networks to mitigate the …
8 out of 10 applications fail to meet security standards
Considered “low hanging fruit” because of their prevalence in software applications, XSS and SQL Injection are two of the most frequently exploited …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)