Please turn on your JavaScript for this page to function normally.
Vulnerability scanning with PureCloud

nCircle PureCloud is a cloud-based network security scanning product built upon the companies' vulnerability and risk management system IP360.

Online password management with my1login

In this day and age when everything moves from client computers to the cloud, a number of companies started providing online password management services. I recently attended …

Codeproof for iOS

Codeproof Technologie is a SaaS (Software-as-a-Service) provider from Redmond that offers a mobile device management (MDM) solution for Android and iOS devices. This review …

Nipper Studio: A new approach to security auditing

Developed by UK-based Titania Ltd., Nipper Studio is an interesting solution that takes a whole new approach towards security auditing. Wouldn't it be great to be able to …

Hijacking airplanes with an Android phone

An extremely well attended talk by Hugo Teso, a security consultant at n.runs AG in Germany, about the completely realistic scenario of plane hijacking via a simple Android …

Lookout for iPhone

One of the recent issues of Forbes magazine featured a three-page story on Lookout Inc., the company that, according to the article, has been able to trounce …

Secret Contacts+ 1.0 for iOS

Secret Contacts+ enables you to manage a completely private contact list. You can either add new contacts or copy the ones from your current contact list.

WordPress 3 Ultimate Security

This book has over 350 pages and, as the title says, aims to be the ultimate Wordpress 3 security guide. The author built the book around the premise that the website is as …

World’s largest oil company Saudi Aramco hit by malware

Saudi Aramco, the national oil company of Saudi Arabia, reported a serious security breach which may caused major disruptions in their network. A piece of malware caused a …

Burning enterprise authentication issues

Threats keep evolving and are becoming more invasive, targets now go beyond the financial industry and involve any company that has sensitive information – whether its …

Vulnerability disclosure framework for industrial control systems

The Industrial Control Systems Joint Working Group (ICSJWG) published “The Industrial Control Systems Common Vulnerability Disclosure Framework”, which is a …

What’s going on with the Cybersecurity Act of 2012?

This week we have witnessed a heated debate between US Senators who showed opposite opinions on the Cybersecurity Act of 2012, a bill aimed at regulating a number of important …

Don't miss

Cybersecurity news