software
CentOS 6.0 released
CentOS 6.0 for i386 and x86_64 architectures is now available. It is based on the upstream release EL 6.0 and includes packages from all variants. All upstream repositories …
Syringe: Windows injection utility
SecureState released Syringe, a general purpose injection utility for the windows platform. It supports injection of DLLs, and shellcode into remote processes as well as …
The future of identity verification through keystroke dynamics
When someone mentions biometrics, the first (and sometimes the only) thing that comes to mind to many people are physical characteristics on the basis of which people can be …
WordPress 3.1.4 fixes security issues
WordPress 3.1.4 is available now and is a maintenance and security update for all previous versions. This release fixes an issue that could allow a malicious Editor-level user …
2011 CWE/SANS top 25 most dangerous software errors
SANS and Mitre have released the CWE/SANS Top 25 Most Dangerous Software Errors list for 2011. The list was compiled with the help of a great number of security experts from a …
Free anti-virus technology for Amazon EC2
AVG announced free anti-virus technology for Amazon EC2 users. The preconfigured software bundled within an Amazon Machine Image (AMI) is now available on the Amazon Web …
Encrypted voice calling for the iPhone
Cellcrypt Mobile for iPhone provides voice call encryption for commercially available off-the-shelf cell phones using government-certified security through an easy-to-use …
Spammers push cloned apps on Android Market
No stone is left unturned, no option unexplored when it comes to online spamming, and the latest approach has shown that malware authors are not the only ones who have taken …
Simplified security policy management
The consumerization of IT can bring new workforce efficiencies, as well as potentially devastating enterprise security and compliance risks. As organizations grapple with the …
Layered approach to enterprise data security
GreenSQL launched its Enterprise Edition for Unified Database Security which offers security, caching, auditing and masking in one package, ensuring that enterprise databases …
Chrome extension for identifying insecure code
In a bid to help developers keep their websites clear of security holes, Google has built – and offered for free – a (currently experimental) Chrome extension …
Faster password hashes cracking based on the DES algorithm on CPUs
Openwall released an updated version of John the Ripper, a password security auditing tool and open source project, providing the community with improvements in the …
Featured news
Resources
Don't miss
- Russian hackers are exploiting recently patched Microsoft Office vulnerability (CVE-2026-21509)
- Notepad++ supply chain attack: Researchers reveal details, IoCs, targets
- Why boards must prioritize non-human identity governance
- Open-source attacks move through normal development workflows
- Product showcase: 2FAS Auth – Free, open-source 2FA for iOS