software
Five ways to migrate applications to the cloud
Organizations seeking to move applications into the cloud have five options: rehost on infrastructure as a service (IaaS), refactor for platform as a service (PaaS), revise …
Chromebook: A new class of risks
We are certainly living in interesting times. It was less than a week ago that a rumor appeared that Apple is going to switch to ARM processors for its next generation of …
Automated solution for patching software vulnerabilities
A universal law enforcement axiom states that criminals prefer to trespass through vulnerable open or unlocked doors or windows. In the IT and software industries, the same …
HP Intelligent Management Center multiple vulnerabilities
Multiple vulnerabilities have been reported in HP Intelligent Management Center (IMC), which can be exploited by malicious people to compromise a vulnerable system, according …
BackTrack 5 released
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to …
Run OS X, Windows and Linux side-by-side on a Mac mini
Parallels Server for Mac 4.0 Mac mini Edition lets businesses turn an Apple Mac mini server running Mac OS X Server into a multi-purpose platform capable of running Mac OS X, …
GFI MailEssentials Complete released
GFI Software launched GFI MailEssentials Complete, an anti-spam, anti-phishing and email security solution for SMBs which gives organizations an email security solution they …
Enhance mobility and security at branch offices
Cisco announced new solutions that continue to enhance mobility and security at branch offices without adding new in-branch hardware or support burdens. Using cloud deployment …
Free browser-based security assessment
Shavlik Technologies announced a new browser-based security advisory that helps identify potential security vulnerabilities on a network. Shavlik Security Advisor scans all …
Cloud-based protection for virtualized environments
Panda Security launchd Panda Virtual GateDefender Performa which delivers cloud-based protection for VMWare virtualized environments. Companies can now protect their perimeter …
Skype for Mac message processing code execution vulnerability
Pure Hacking, a group of ethical hackers in Australia, reported directly to Skype what they believed to be a zero-day vulnerability in Skype for Mac 5.x The vulnerability in …
iPhone tracking software
Footprints is an iOS geolocation application that enables you to share locations with your friends and family anytime, privately. With Footprints, you can track locations in …
Featured news
Resources
Don't miss
- Attackers use “Contact Us” forms and fake NDAs to phish industrial manufacturing firms
- New framework aims to outsmart malware evasion tricks
- Finding connection and resilience as a CISO
- AI isn’t taking over the world, but here’s what you should worry about
- Agentic AI coding assistant helped attacker breach, extort 17 distinct organizations