Please turn on your JavaScript for this page to function normally.
ElcomSoft adds AMD Radeon 7000 Series support

ElcomSoft updated its Phone Password Breaker and Wireless Security Auditor with OpenCL support, adding support for the latest AMD Radeon Graphics and ensuring universal …

Researchers compromise e-voting system

A group of researchers from the University of Michigan has recently attacked and managed to compromise the Washington, DC Digital Vote by Mail Internet voting system, proving …

Metasploit identifies IPv6 security risks

Rapid7 announced that the new version of Metasploit 4.2 allows users to fully test whether IPv6 addresses on their network are vulnerable to cyber attacks. This is …

Acunetix Web Vulnerability Scanner 8 released

Acunetix Web Vulnerability Scanner 8 (WVS) echoes years of counter-hacking experience through its new ability to lock hackers out by integrating scan results into …

Nessus 5.0 vulnerability scanner released

Tenable Network Security announced Nessus 5.0, a vulnerability and configuration assessment solution for enterprises and security professionals. Nessus 5.0 delivers introduces …

Cloud-based fuzzing for zero-day vulnerability discovery

Codenomicon released the Fuzz-o-Matic cloud-based software security Testing-as-a-Service (TaaS) platform for enterprise software and applications running on Windows, Linux, …

Arachni: Web application security scanner framework

Arachni is an open source Web application security scanner framework, a modular framework that allows fast, accurate and flexible vulnerability assessment. In order to …

Is your online bank vulnerable to currency rounding attacks?

In the 12+ years of doing penetration tests against various critical environments, we’ve seen numerous online banking servers and found all sorts of vulnerabilities in …

BackTrack 5 Wireless Penetration Testing

If you're considering a career in penetration testing, you probably already know that BackTrack is the Linux distribution favored by most pentesters due to it being preloaded …

A Bug Hunter’s Diary

For individuals who make a living developing and maintaining software systems, finding bugs in their own code is almost a daily ritual. Working on software developing projects …

Free tool exploits SQL injection vulnerabilities

NT OBJECTives announced NTO SQL Invader, a free tool which provides pen testers and developers the ability to quickly and easily exploit and demonstrate SQL Injection …

NetWars to test the skills of infosec professionals

At SANS London 2011, Europe’s largest IT security training event, NetWars will be launched for the first time in the UK. NetWars participants compete in a mock …

Don't miss

Cybersecurity news