software
MySQL 5.5 released
MySQL 5.5 delivers significant enhancements enabling users to improve the performance and scalability of web applications across multiple operating environments, including …
Voice encryption app for the iPhone
Kryptos is a secure VoIP application for the iPhone. It utilizes 256-bit AES military grade encryption to encrypt voice communications between users, while using 1024-bit RSA …
Metasploit 3.5.1 adds Cisco device exploitation
Metasploit now enables security professionals to exploit Cisco devices, performs passive reconnaissance through traffic analysis, provides more exploits and evaluates an …
Network access control system PacketFence 2.0 released
PacketFence is a free and open source network access control (NAC) system. It can be used to effectively secure networks – from small to very large heterogeneous …
Metasploit achieves CVE compliance
Rapid7 announced that Metasploit Pro and Metasploit Express have achieved Common Vulnerabilities and Exposures (CVE) compliance. CVE associates unique identifiers to security …
Multiple vulnerabilities in RealPlayer
Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user’s system, according to Secunia. Users should …
Advanced iPhone spy application
Mobistealth launched an advanced iPhone spy application which can be installed on any iPhone and runs completely in the background. The application is virtually undetectable …
Deploy and remotely execute programs on Windows networks
RemoteExec for Windows is an agentless, encrypted software solution that allows IT pros to: Quickly and easily deploy MSI packages, Service Packs, patches, hotfixes, etc. …
Run Nmap on Android
Droidmap is an Android application for root users that implements some functions of Nmap in a GUI. This program comes with installer scripts for the installation of the …
Nessus in the cloud
The Nessus vulnerability scanner features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of an …
CORE IMPACT Pro 11 now detects and exploits network router vulnerabilities
Core Security Technologies introduced the latest version of its automated penetration testing solution, CORE IMPACT Pro 11. CORE IMPACT Pro enables users to conduct real-world …
Vulnerability scanning added to GFI MAX RemoteManagement
GFI Software added vulnerability scanning and security patch management to GFI MAX RemoteManagement, an IT managed services software solution that makes it easy to stay on top …