Please turn on your JavaScript for this page to function normally.
Secure replacement for the Certificate Authority System

Convergence is a secure replacement for the Certificate Authority System. Rather than employing a traditionally hard-coded list of immutable CAs, Convergence allows you to …

Network and security analysis with Trisul

Trisul is a new kind of network monitor that supplements fine grained traffic metering with flows, packets, and alerts. You can carry out any kind of network and security …

eFront multiple vulnerabilities

Multiple vulnerabilities have been reported in eFront, according to Secunia. These can be exploited by malicious users to conduct SQL injection attacks and compromise a …

ICSA Labs tests products against larger malware set

ICSA Labs, an independent division of Verizon, is now testing products in its Anti-Virus program against virus samples from not only the WildList (a database of real-world …

How does GFI LanGuard help network administrators?

Managing an IT network that is continuously changing and growing is not a trivial task. Once the network comprises more than a handful of machines, it becomes a …

Websense introduces URL categories and social web controls

Websense introduced URL categories and social web controls that enable IT managers to better regulate specific employee actions, reduce exposure to dangerous data-stealing …

Cisco WebEx Player WRF file processing vulnerabilities

Multiple buffer overflow vulnerabilities exist in the Cisco WebEx Recording Format (WRF) player. In some cases, exploitation of the vulnerabilities could allow a remote …

Secure file sharing app for iOS

Accellion Mobile Apps for iPad and iPhone with iOS 5 support provide secure mobile file sharing capabilities are currently available from the App Store. The Accellion Mobile …

Bug allows remote code execution in Chrome

In September ACROS Security notified Google about a peculiar behavior of the Chrome browser that can be exploited for execution of remote code outside Chrome sandbox under …

Security code review tool Agnitio 2.1 released

Agnitio is an application security tool developed by David Rook to help further the adoption of the Principles of Secure Development and to bring more repeatability and …

Encrypt and protect virtual machine images

HighCloud Security unveiled VM-Centric Security, a solution to encrypt and protect virtual machine (VM) images and the data they contain throughout their lifecycle. The …

Anonymous proxy for iPhone and iPad

NetShade makes your web presence anonymous by routing your connection through a proxy server. NetShade is a subscription service. With an account, you can use the five …

Don't miss

Cybersecurity news