Please turn on your JavaScript for this page to function normally.
IBM’s Big Data analytics solution to uncover criminal cyber activity in seconds

IBM announced new high-speed analysis and criminal investigation software that is designed to uncover hidden criminal threats buried deep inside massive volumes of disparate …

Open source NAC solution PacketFence 4.5.0 released

PacketFence is a free and open source Network Access Control (NAC) solution. It can be used to effectively secure small to very large heterogeneous networks. Among the …

Avast 2015 identifies vulnerable home routers

Avast Software launched Avast 2015, available in four consumer variations: Avast Free Antivirus, Avast Pro Antivirus, Avast Internet Security, and Avast Premier. All versions …

What all major brands share in common with the Snappening

By now we have all heard about “The Snappening”—hyped as a high-profile data breach involving the photo-sharing application Snapchat. Virtually every news outlet …

Delivering malicious Android apps hidden in image files

Researchers have found a way to deliver a malicious app to Android users by hiding it into what seems to be an encrypted image file, which is then delivered via a legitimate, …

OS X Yosemite comes with POODLE and Shellshock patches

Last week Apple released a new version of its operating system to consumers. What’s interesting to note is that OS X 10.10 (aka “Yosemite”) also came with a …

The Software Assurance Marketplace: A response to a challenging problem

With the steady proliferation of wearable devices and the emergence of the Internet of Things, everyone and everything will eventually be connected by some piece of software. …

Tor Browser 4.0, Tails 1.2 are out

The Tor Project has released version 4.0 of its popular eponymous browser that allows users to use the Internet anonymously and privately, and to circumvent online censorship …

GFI Software redesigns WebMonitor 2015

GFI Software announced GFI WebMonitor 2015, the latest version of the company’s Web filter, management and security solution for businesses. GFI completely redesigned …

Lessons learned developing Lynis, an open source security auditing tool

If you’ve been involved with information security for more than a decade, you’ve probably heard of Rootkit Hunter or rkhunter, a software whose primary goal is to …

Monitoring tool profiles user behavior to reveal human risk

BalaBit unveiled Blindspotter, an IT security tool that analyzes all user activity, including malicious events, occurring throughout IT systems. Blindspotter features …

Rapid7 releases Nexpose Ultimate

Rapid7 released Nexpose Ultimate, a vulnerability management solution that combines assessment of vulnerabilities and controls, vulnerability validation, and prioritized …

Don't miss

Cybersecurity news