Help Net Security
Free tool exploits SQL injection vulnerabilities
NT OBJECTives announced NTO SQL Invader, a free tool which provides pen testers and developers the ability to quickly and easily exploit and demonstrate SQL Injection …
Tips for securing Internet connected devices
From the hottest new tablet to sleek smartphones and laptops, electronic devices are likely at the top of many consumers’ holiday wish lists this year. Many lucky …
Free data loss prevention tool for enterprise IT
STEALTHbits released of DLP Lite for File Systems, a free, regex DLP tool that aids organizations in identifying high-risk, unsecured content on their networks to mitigate the …
Secure remote access from SonicWALL
The proliferation of powerful smartphones and tablets poses a new problem for IT: providing secure remote access to network resources for a growing number of employees who use …
8 out of 10 applications fail to meet security standards
Considered “low hanging fruit” because of their prevalence in software applications, XSS and SQL Injection are two of the most frequently exploited …
Top 5 Android malware families
On November 15, Gartner issued a report that cited Google’s Android mobile operating system had reached a global 52.5% smart phone market share, while iOS trailed in …
Patch management integration with Nessus
Tenable Network Security announced that Nessus and SecurityCenter now integrate with top patch management solutions.: Red Hat Network Satellite Server, Microsoft Windows …
QualysGuard Web Application Scanning
Yesterday, Qualys released version 2.1 of QualysGuard Web Application Scanning (WAS), that integrates with Selenium to help companies further automate scanning of web …
Proactive detection of cyber security incidents
ENISA today launched a report which identifies 16 shortcomings in detection of network security incidents. The report reveals that not all available tools are used widely …
CloudVerse: Cloud management framework
Cisco introduced CloudVerse, a framework that combines the foundational elements needed to enable organizations to build, manage and connect public, private and hybrid clouds. …
AuthenTec acquires PeerSec Networks
AuthenTec has acquired PeerSec Networks, a provider of networking security solutions. The PeerSec Networks team and complete product portfolio, which includes the Matrix …
U.S. wakes up to cybercrime threat
Businesses in the U.S. are increasingly waking up to the threat of cyber crime according to the latest Lloyd’s Risk Index, but evidence shows the problem of cyber crime …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025