software
Protect data by finding forgotten databases
Application Security declared that organizations can no longer afford to guess or assume that they have their database inventory under control. Based on the premise that you …
Web filtering technology with next-generation firewall capabilities
Barracuda Networks announced the integration of the Barracuda NG Firewall and Barracuda Web Security Flex. This solution combines cloud-based Web filtering technology with …
Open source password manager gets two-factor authentication
Yubico announced a successful implementation of YubiKey two-factor authentication with the free, open source password manager software Password Safe. The joint solution offers …
Citrix releases open source cloud platform
Today Citrix announced the availability of Citrix CloudStack 3, the first release of the open source cloud platform under the Citrix brand. CloudStack is already the …
Kaspersky Lab unveils virtualization security solution
Kaspersky Lab announced Kaspersky Security for Virtualization, focused on protecting evolving corporate IT infrastructures from malware and cybercriminals. The solution …
Apple iWork passwords cracked
ElcomSoft can now recover passwords protecting Apple iWork documents. This makes Distributed Password Recovery the first tool to recover passwords for Numbers, Pages and …
Web app security scanner Netsparker 2.1 released
Netsparker can crawl, attack and identify vulnerabilities in all custom web applications regardless of the platform and the technology it’s built on, just like an actual …
Faronics Anti-Virus 3.0 released
Faronics Anti-Virus 3.0 includes Process Protection to defend against attacks at the application level, as well as an IDS that has the ability to write rules for zero day …
Satellite telephony encryption cracked
Satellite telephony was thought to be secure against eavesdropping. Researchers at the Horst G?¶rtz Institute for IT-Security (HGI) at the Ruhr University Bochum (RUB) have …
Security architecture for trusted execution environments
Elliptic Technologies introduced the tVault Security Architecture – a technology that enables end-to-end security in connected devices. tVault provides robust security …
Improved data recovery from SSDs
Data recovery from new types of data storage can be extremely time-consuming because of the need to research the algorithms used to originally store the data. Previously, …
Security for IT consumerization
Lancope announced that its StealthWatch System extends network visibility to mobile devices for the security of bring-your-own-device (BYOD) environments. By analyzing mobile …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring