software
Steganos Privacy Suite 12 released
The latest version of the all-in-one data protection software, Steganos Privacy Suite 12, combines eight tools for optimizing user privacy protection, including: data …
Rapid7 releases NeXpose 4.10
Rapid7 announced NeXpose 4.10, the latest version of its vulnerability management solution, providing enterprise customers with visibility and actionable intelligence for …
Cisco AnyConnect: Secure network connectivity for Apple iOS
Cisco AnyConnect Secure Mobility Solution, available from the App Store, offers highly secure network connectivity from any Apple iOS 4.1 device, improving the productivity of …
Free security tool detects vulnerable and outdated software
Secunia released version 2.0 of their Personal Software Inspector (PSI), a popular free security tool for home users that protects their personal and financial information …
Performance concerns make 25% of users turn off AV
More than 60 percent of respondents have tried multiple anti-virus products over the course of a year, according to Avira. In addition, 25 percent of the users admitted to …
Tracking protection lists for Internet Explorer 9
Microsoft recently announced that IE9 will enable users to import independently curated lists of third party domains, which can be blocked or allowed access to a user’s …
MySQL 5.5 released
MySQL 5.5 delivers significant enhancements enabling users to improve the performance and scalability of web applications across multiple operating environments, including …
Voice encryption app for the iPhone
Kryptos is a secure VoIP application for the iPhone. It utilizes 256-bit AES military grade encryption to encrypt voice communications between users, while using 1024-bit RSA …
Metasploit 3.5.1 adds Cisco device exploitation
Metasploit now enables security professionals to exploit Cisco devices, performs passive reconnaissance through traffic analysis, provides more exploits and evaluates an …
Network access control system PacketFence 2.0 released
PacketFence is a free and open source network access control (NAC) system. It can be used to effectively secure networks – from small to very large heterogeneous …
Metasploit achieves CVE compliance
Rapid7 announced that Metasploit Pro and Metasploit Express have achieved Common Vulnerabilities and Exposures (CVE) compliance. CVE associates unique identifiers to security …
Multiple vulnerabilities in RealPlayer
Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user’s system, according to Secunia. Users should …
Featured news
Resources
Don't miss
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities