software
The Software Assurance Marketplace: A response to a challenging problem
With the steady proliferation of wearable devices and the emergence of the Internet of Things, everyone and everything will eventually be connected by some piece of software. …
Tor Browser 4.0, Tails 1.2 are out
The Tor Project has released version 4.0 of its popular eponymous browser that allows users to use the Internet anonymously and privately, and to circumvent online censorship …
GFI Software redesigns WebMonitor 2015
GFI Software announced GFI WebMonitor 2015, the latest version of the company’s Web filter, management and security solution for businesses. GFI completely redesigned …
Lessons learned developing Lynis, an open source security auditing tool
If you’ve been involved with information security for more than a decade, you’ve probably heard of Rootkit Hunter or rkhunter, a software whose primary goal is to …
Monitoring tool profiles user behavior to reveal human risk
BalaBit unveiled Blindspotter, an IT security tool that analyzes all user activity, including malicious events, occurring throughout IT systems. Blindspotter features …
Rapid7 releases Nexpose Ultimate
Rapid7 released Nexpose Ultimate, a vulnerability management solution that combines assessment of vulnerabilities and controls, vulnerability validation, and prioritized …
Bugzilla bug that could reveal other software flaws has been patched
A critical security vulnerability in the popular online bug-tracking-and-testing tool Bugzilla has been patched, and users are advised to update to new releases as soon as …
Researchers test EMET 5 protections, find them wanting
Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) has once again failed to stop an attack mounted by researchers working with Offensive Security, the company …
Unpatched systems and apps on the rise
As the number of software vulnerabilities increases, and people connect across personal and corporate devices using a multitude of different platforms each day, time and time …
Free tool tracks DNS changes in DNS zone files
Incorrect edits to DNS can have catastrophic consequences such as disconnecting an entire company website or its email servers and causing costly downtime. LogicMonitor …
Hong Kong protesters hit with malware, turn to “off-the-grid” chat app
The pro-democracy protests started by Hong Kong students’ and backed by the Occupy Central protesters (Central is the name of Hong Kong’s financial district) are …

Data Protection for Photographers
Today's high resolution digital cameras ensure that active photographers have to manage massive amounts of data. Keeping this data safe in the long run can present a …