World’s smallest Linux networking server
Lantronix announced XPort Pro which enables you to deploy advanced applications at the network edge, all in an integrated, thumb-sized package running Linux and IPv6 Advanced …
Microsoft makes digital forensics tool available to U.S. law enforcement agencies
Microsoft announced an agreement with the National White Collar Crime Center (NW3C) to distribute the Computer Online Forensic Evidence Extractor (COFEE). The NW3C is a …
Adobe patches 29 critical vulnerabilities
Critical vulnerabilities have been identified in Adobe Reader 9.1.3 and Acrobat 9.1.3, Adobe Reader 8.1.6 and Acrobat 8.1.6 for Windows, Macintosh and UNIX, and Adobe Reader …
Microsoft patches 34 vulnerabilities
In today’s massive Patch Tuesday Microsoft delivers 13 bulletins that fix 34 vulnerabilities targeting Windows, Internet Explorer, the .NET framework, Office, SQL …
Secure managed file transfer solutions for business
nuBridges released nuBridges Exchange 3.0, its secure managed file transfer (MFT) software for today’s extended enterprise which helps organizations reduce file transfer …
Web-based firewall log reporting and analysis tool Webfwlog 0.94 released
Webfwlog is a flexible web-based firewall log analyzer and reporting tool. It supports standard system logs for linux, FreeBSD, OpenBSD, NetBSD, Solaris, Irix, OS X, etc. as …
Barracuda Networks acquires Purewire
Barracuda Networks has completed the acquisition of Purewire. This combination broadens the company’s cloud-based platform, enabling it to extend its market leading …
Advanced endpoint protection for Mac
McAfee has expanded its endpoint protection products for the Macintosh platform with the release of McAfee Endpoint Protection for Mac. Features include: Single integrated …
Hardware security module for payment security systems
Thales announced payShield 9000, its payment Hardware Security Module (HSM). Designed specifically to secure card payment systems, this is a high-performance tamper-resistant …
Free tool to detect poisoned web pages
The popular practice of embedding shortened URL into Twitter tweets, Digg posts and other social networking communications is being threatened by attackers who use the …
Anonymizing network I2P 0.7.7 released
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of …
Threat management services from Trend Micro
Trend Micro announced Threat Management Services that uncover threats and provide proactive early warning, containment and remediation. Threat Management Services consists of …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades