Web-based firewall log reporting and analysis tool Webfwlog 0.94 released
Webfwlog is a flexible web-based firewall log analyzer and reporting tool. It supports standard system logs for linux, FreeBSD, OpenBSD, NetBSD, Solaris, Irix, OS X, etc. as …
Barracuda Networks acquires Purewire
Barracuda Networks has completed the acquisition of Purewire. This combination broadens the company’s cloud-based platform, enabling it to extend its market leading …
Advanced endpoint protection for Mac
McAfee has expanded its endpoint protection products for the Macintosh platform with the release of McAfee Endpoint Protection for Mac. Features include: Single integrated …
Hardware security module for payment security systems
Thales announced payShield 9000, its payment Hardware Security Module (HSM). Designed specifically to secure card payment systems, this is a high-performance tamper-resistant …
Free tool to detect poisoned web pages
The popular practice of embedding shortened URL into Twitter tweets, Digg posts and other social networking communications is being threatened by attackers who use the …
Anonymizing network I2P 0.7.7 released
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of …
Threat management services from Trend Micro
Trend Micro announced Threat Management Services that uncover threats and provide proactive early warning, containment and remediation. Threat Management Services consists of …
QNAP’s 2-drive desktop NAS server
QNAP announced the TS-210 desktop NAS server targeted specifically at the SOHO and Prosumer market segments. It supports up to 2 3.5″ SATA hard drives with up to 4TB of …
Survey: 77% of users employ the same password all over
ElcomSoft has conducted a survey on its customers, and discovered a major security hole in the choice of passwords among respondents. According to the survey, as many as 77% …
What to do when Google blocks your website?
I think that everyone has encountered, at least once in their Net surfing history, the following alerts next to a search result: “This site may harm your …
Netsparker: Web application security scanner
Netsparker can crawl, attack and identify vulnerabilities in all custom web applications regardless of the platform and the technology it’s built on, just like an actual …
BSA: 41% of software on personal computers is pirated
Individuals are turning to P2P networks and auction sites in staggering numbers to acquire or transfer illegal software and in doing so are harming the economy whilst exposing …
Featured news
Resources
Don't miss
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)