software
Slow HTTP DoS vulnerability test tool
Slow HTTP DoS attacks rely on the fact that the HTTP protocol, by design, requires requests to be completely received by the server before they are processed. If an HTTP …
PBConnex: Full-disk encryption with pre-boot networking
WinMagic launched SecureDoc with PBConnex, a full-disk encryption solution with pre-boot networking. PBConnex, an extension to SecureDoc, fully integrates network support …
Microsoft updates free security tools
Microsoft enhanced three of its free Security Development Lifecycle (SDL) tools – Threat Modeling, MiniFuzz, and RegExFuzz. Threat Modeling Tool 3.1.8 The Threat …
Cyber threat protection for enterprise networks
Damballa released Failsafe 4.2, an advance in detecting criminal command-and-control behavior in corporate networks. Failsafe pinpoints corporate assets under criminal …
Next generation security as a service
In this video recorded at Black Hat 2011 in Las Vegas, Sumedh Thakar, Vice President of Engineering at Qualys, talks about QualysGuard Web Application Scanning (WAS) 2.0, the …
“Apache Killer” tool spotted in the wild
The developers behind the open source Apache Foundation issued a warning for all users of the Apache HTTPD Web Server, as an attack tool it has been made available on the …
PHP 5.3.8 fixes security issues
The PHP development team released PHP 5.3.8. This release fixes two issues introduced in the PHP 5.3.7 release: Fixed bug #55439 (crypt() returns only the salt for MD5) …
Skype XSS vulnerability allows malicious code injection?
According to a German researcher, a XSS bug in the latest (5.5.0.113) Skype version for Windows could allow attackers to inject malicious code into users’ phone sessions …
ShredIt X 6 for Mac OS X released
Mireth Technology released ShredIt X 6, its file shredder and hard drive cleaner software for Mac OS X. ShredIt X can be used to erase files, folders, disk free space, …
RealPlayer multiple vulnerabilities
Some vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user’s system, according to Secunia. 1. A …
StealthWatch 6.1 adds internal and external monitoring capabilities
Lancope released a new version of its monitoring platform, the StealthWatch System 6.1. This version increases both the amount and types of flow data that can be processed by …
PoC keylogger app for smartphones revealed
We are all familiar with keyloggers – software that registers and identifies the keys pressed by a computer user – and its prevalently malicious uses. One of the …
Featured news
Resources
Don't miss
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse