software
LogRhythm and Rapid7 partner on threat protection and security analytics
LogRhythm and Rapid7 announced API-level integrations of the LogRhythm SIEM 2.0 platform with both the Rapid7 Nexpose vulnerability management product and the Rapid7 …
Linux community adopts UEFI technology
The Unified Extensible Firmware Interface (UEFI) Forum, a non-profit industry standards body of leading technology companies that promotes firmware innovation by creating …
ID Network Attributes provides insight into identity risk
ID Analytics launched ID Network Attributes, targeted consumer behavior insights that provide visibility into the risk of an identity or transaction. Available in both Fraud …
Security firm publishes details about Java issue, asks for second opinion
Making good on their promise, Security Exploration has published technical details about a Java issue that they consider to be a security vulnerability, but Oracle has …
Splunk integrates with relational databases
Splunk announced Splunk DB Connect, which delivers scalable, real-time integration between Splunk Enterprise and traditional relational databases. With Splunk DB Connect, …
AVG CloudCare adds new email security services
AVG announced a new release of AVG CloudCare, the cloud based administration platform that allows remote deployment and management of IT and security services for SMBs. The …
Free Android malware analysis tool
Bluebox Labs announced Dexter, a free tool to help researchers and enterprise security teams analyze applications for malware and vulnerabilities. The Dexter platform provides …
Japanese student sets up free VPN service
There are a lot of people around the world that would like to bypass firewalls set up by their governments, but not everybody can afford to do it. Enter Daiyuu Nobori, a …
Microsoft continues to focus on security in their products
86% of vulnerabilities discovered in the most popular 50 programs in 2012 were in non-Microsoft (or “third-party”) programs. The result was published today in the …
Metasploit supports Kali Linux free security auditing toolkit
Rapid7 is working with Offensive Security to provide official Metasploit support for Kali Linux, the enterprise-ready evolution of BackTrack Linux. The free security auditing …
Trend Micro introduces new end user protection suite
Trend Micro announced a new suite – Trend Micro Enterprise Security and Data Protection – designed to help companies efficiently mitigate the risks of attacks and …
Improving the security for Android embedded systems
McAfee has delivered a whitelisting security solution for Android based embedded systems. McAfee Application Control for Android resides in the Android kernel, embedded in the …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)