Anonymizing network I2P 0.7.7 released
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of …
Threat management services from Trend Micro
Trend Micro announced Threat Management Services that uncover threats and provide proactive early warning, containment and remediation. Threat Management Services consists of …
QNAP’s 2-drive desktop NAS server
QNAP announced the TS-210 desktop NAS server targeted specifically at the SOHO and Prosumer market segments. It supports up to 2 3.5″ SATA hard drives with up to 4TB of …
Survey: 77% of users employ the same password all over
ElcomSoft has conducted a survey on its customers, and discovered a major security hole in the choice of passwords among respondents. According to the survey, as many as 77% …
What to do when Google blocks your website?
I think that everyone has encountered, at least once in their Net surfing history, the following alerts next to a search result: “This site may harm your …
Netsparker: Web application security scanner
Netsparker can crawl, attack and identify vulnerabilities in all custom web applications regardless of the platform and the technology it’s built on, just like an actual …
BSA: 41% of software on personal computers is pirated
Individuals are turning to P2P networks and auction sites in staggering numbers to acquire or transfer illegal software and in doing so are harming the economy whilst exposing …
Implications of increasing malicious spam
Recent data from the Symantec monthly spam report suggests that the percentage of spam containing malware has increased. In September 2009, an average of 1.3 percent of all …
Metasm: Assembler, disassembler, compiler, linker and debugger
Metasm is a cross-architecture assembler, disassembler, compiler, linker and debugger. It is written in pure Ruby, with no dependency. It has some advanced features such as …
Sensitive data discovery and masking solution
Dataguise announced an integrated solution for comprehensive sensitive data discovery and masking featuring dgdiscover 3.0 and dgmasker 3.0. It is designed to find structured …
Vulnerability scanner SAINT 7.1.3 released
SAINT offers an integration of vulnerability assessment and penetration testing tools. New features in version 7.1.3: Added support for ntlmv2 authentication. SAINTwriter: …
Qsan’s 10GbE iSCSI storage solutions for cloud computing
This October, Qsan will present the latest redundant 10GbE iSCSI storage solutions – 3160TG and EP-3164D-GAS3 which are integrated with Qsan’s P500H 10GbE iSCSI …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month