Please turn on your JavaScript for this page to function normally.
VM Explorer 3.5 released

VM Explorer is a management tool that eases management, backup and disaster recovery tasks in your VMware ESX environment. Backups can be stored on ESX, Windows, Linux and …

ElcomSoft exposes information in BlackBerry backups

With BlackBerries occupying approximately 40 per cent of the North American market of business communicators and about 20 per cent of the market worldwide, accessing …

Microsoft Web Application Configuration Analyzer 2.0 released

Web Application Configuration Analyzer (WACA) is a tool that scans a server against a set of best practices recommended for pre-production and production servers. The list of …

Microsoft Forefront Endpoint Protection 2012 Beta released

Microsoft released Forefront Endpoint Protection 2012 Beta which continues to provide proactive protection against known and unknown threats using multiple technologies in the …

Mobile Encryption for iOS and Android

Sophos announced a number of new enterprise product lines that together offer protection anywhere and on any device. Sophos Mobile Control provides lightweight device …

VirtualBox 4.0.8 released

VirtualBox enables desktop or laptop computers to run multiple operating systems simultaneously, and supports a variety of host operating systems, including Windows, Mac OS X, …

PC Lock protects from identity theft, privacy invasion

Laplink released PC Lock, data encryption software with cloud management. Its Web Management Console lets users modify preferences, change settings, reset passwords, lock the …

Unattended Linux VM configuration tool for Hyper-V

Set-LinuxVM is a tool provided as a Windows PowerShell module which is able to create Linux Virtual Machines on a Hyper-V host. It supports Debian, Ubuntu, CentOS, Fedora, …

Five ways to migrate applications to the cloud

Organizations seeking to move applications into the cloud have five options: rehost on infrastructure as a service (IaaS), refactor for platform as a service (PaaS), revise …

Chromebook: A new class of risks

We are certainly living in interesting times. It was less than a week ago that a rumor appeared that Apple is going to switch to ARM processors for its next generation of …

Automated solution for patching software vulnerabilities

A universal law enforcement axiom states that criminals prefer to trespass through vulnerable open or unlocked doors or windows. In the IT and software industries, the same …

HP Intelligent Management Center multiple vulnerabilities

Multiple vulnerabilities have been reported in HP Intelligent Management Center (IMC), which can be exploited by malicious people to compromise a vulnerable system, according …

Don't miss

Cybersecurity news