software
Sophos tackles BYOD challenges
Sophos announced Sophos EndUser Protection, a new security offering that tackles the challenges associated with bring-your-own-device (BYOD), and the increasing number of …
Critical Ruby on Rails flaws fixed, upgrade immediately
For the second week in a row since the start of the new year, users of open source web application framework Ruby on Rails are advised to upgrade to the newly offered versions …
Firefox 18 released, fixes security issues
Mozilla released Firefox 18 that fixes several security and stability issues. Included in the update are twelve critical, seven high and one moderate security update. Fixed in …
Arbor Networks updates security and traffic-monitoring platform
Arbor Networks announced the availability of version 5.8 of Peakflow SP, a network-wide infrastructure security and traffic-monitoring platform for service, hosting and cloud …
VPN app for iOS and Android
Private Communications announced its new personal VPN application for Android and iOS devices. A personal VPN app for Windows 8 phones and tablets will soon follow. It is easy …
Intel and McAfee to deliver consumer-centric online security
Together with Intel, McAfee is redefining the consumer security experience with a focus on safeguarding consumer devices, securing personal data and protecting identities …
Seagate releases storage device with Smart TV app
Seagate announced the first storage device to feature a Smart TV app for access to files on the big screen. Seagate Central delivers automatic backup for the entire home, …
Vulnerability management in the cloud from Dell SecureWorks
Dell SecureWorks announces a new Vulnerability Management Service (VMS) and a new Web Application Scanning (WAS) Service for the Cloud. These add-on Cloud security solutions …
Copied Android apps sold on Google Play at higher prices
App developer Root Uninstaller claims that some of his original apps for the Android platform have been copied and are currently being sold on Google Play. He offers the …
Keycard: Unlock your Mac using an iOS device
Keycard allows you to pair your iPhone or other Bluetooth enabled device with your Mac to lock and unlock your computer. It detects when you’re leaving your desk, …
Improve your firewall auditing
As a penetration tester you have to be an expert in multiple technologies. Typically you are auditing systems installed and maintained by experienced people, often protective …
All Ruby on Rails versions affected by SQL injection flaw
Three new versions of popular open source web application framework Ruby on Rails have been released on Wednesday in order to fix an SQL injection vulnerability that affected …
Featured news
Resources
Don't miss
- CISA warns about actively exploited Broadcom, Commvault vulnerabilities
- Marks & Spencer cyber incident linked to ransomware group
- Eyes, ears, and now arms: IoT is alive
- What’s worth automating in cyber hygiene, and what’s not
- Want faster products and stronger trust? Build security in, not bolt it on