Please turn on your JavaScript for this page to function normally.
Secure USB drive with Windows Embedded Standard 7

Spyrus released a secure USB flash drive with Windows Embedded Standard 7 pre-installed. Unlike other USB flash drives that run the Windows operating system, the Secure Pocket …

Privacy and cleaning tool CCleaner 3.0 released

CCleaner is a system optimization, privacy and cleaning tool. It removes unused files from your system. It also cleans traces of your online activities such as your Internet …

Fabric weaves security into program code

Wouldn’t it be wonderful if we could build security into a program as it is written? This idea spurred a number of researchers from Cornell University to try and develop …

One-touch secure access to corporate data

Check Point announced its new Mobile Access Software Blade that delivers fast and secure access to corporate email, data and business applications from mobile devices. It …

Past, present and future of Metasploit

HD Moore is the CSO at Rapid7 and Chief Architect of Metasploit, an open-source penetration testing platform. HD founded the Metasploit Project with the goal of becoming a …

RSYaba: Modular brute force attacker

RSYaba allows you to run brute force attacks against various services in a similar way to Hydra and Medusa. The tool is written in Ruby so modifying the scripts is a lot …

Integrating Hydra with Nessus

The video below shows you how to integrate custom username and password dictionaries with Hydra to your Nessus scans.

Metasploit Framework 3.5.0 comes with over 600 exploits

The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration …

Comodo Internet Security 2011 released

Comodo released its Internet Security Manager 2011 software which offers malware prevention together with central administration features. New in version 2011 are behavior …

Novell Identity Manager 4 released

Novell released their Identity Manager 4 Advanced Edition which ensures consistent identity, security and compliance policies for an organization’s entire IT ecosystem. …

Metasploit Pro released

Rapid7 released Metasploit Pro which improves the efficiency of penetration testers by providing unrestricted remote network access and enabling teams to collaborate …

Tool to test regular expressions for DoS vulnerabilities

Regular expression patterns containing certain clauses that execute in exponential time (for example, grouping clauses containing repetition that are themselves repeated) can …

Don't miss

Cybersecurity news