software
Tool used in Anonymous Megaupload campaign
Once again, Anonymous is using the low orbit ion canon (LOIC) to DDoS websites. This tool was developed by white hat hackers to stress test websites. Not surprisingly, the …
Programmer steals US government software source code
A Chinese computer programmer has been arrested in New York for having allegedly copied and stolen the source code of software developed by the US Treasury Department, …
Qualys expands its FreeScan service
Qualys announced its new and improved FreeScan service to help SMBs audit and protect their web sites from security vulnerabilities and malware infections. The new FreeScan …
Windows Phone App Analyser 1.0 released
David Rook, the author of the acclaimed security code review tool Agnitio, today released version 1.0 of Windows Phone App Analyser, an application that can be used to …
SharePoint users develop insecure habits
Microsoft SharePoint users are aware of the risks that exposing sensitive data can cause to their organization, yet unbelievably they are using the collaboration tool as an …
New Wi-Fi tool from D-Link and Fluke Networks
D-Link has chosen Fluke Networks’ wireless planning technology to power its new Wi-Fi planning solution, the D-Link Wi-Fi Planner. D-Link Wi-Fi Planner is a wireless …
Alcatel-Lucent and Arbor Networks team up against DDoS attacks
Alcatel-Lucent and Arbor Networks joined forces to tackle the growing threat of DDoS attacks. Such attacks can compromise the communication networks used to provide a growing …
Entrust Discovery now offers Microsoft CAPI query capabilities
Entrust expands its certificate discovery solution, Entrust Discovery, by broadening search capabilities for digital certificates residing within Microsoft’s …
Arachni: Web application security scanner framework
Arachni is an open source Web application security scanner framework, a modular framework that allows fast, accurate and flexible vulnerability assessment. In order to …
Intelligent information governance from Symantec
In order to enable organizations to better protect their information, establish retention policies and streamline their eDiscovery process, Symantec announced its plans for …
Identity intelligence and the complexity of security
An employee’s unauthorized access to client information can leave a firm vulnerable to security breaches and audits. Many companies juggle the administration of …
Secure web gateway protection from Sophos
Virtualization has helped organizations reduce capital and operating costs, while driving greater levels of application availability. It has also yielded benefits in …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025