software
Anti-phishing tool detects fraudulent sites by analyzing their elements
A Hong Kong City University professor that concentrates his effort on ways for combating phishing has recently made public a piece of software that proactively detects …
GFI MAX MailArchive released
GFI Software launched GFI MAX MailArchive, a hosted service which allows businesses to archive email messages to geographically distributed datacenters for future search, …
Multiple vulnerabilities in Google Chrome
Multiple vulnerabilities have been reported in Google Chorme, according to Secunia. Some have an unknown impact while others can be exploited by malicious people bypass …
AV industry fails to cover the basics
NSS Labs released two test reports of endpoint protection products which reveal new shortcomings in these widely deployed products. They cover multi-vector attacks (malware …
Metasploit Pro 3.6 released
Metasploit brings an enhanced command-line feature set for increased proficiency and detailed PCI reports with pass/fail information for a view of compliance posture with PCI …
SonicWALL releases Continuous Data Backup 6.0
SonicWALL launched CDP 6.0 which automatically preserves and protects data assets against loss from file, device, and location based disasters. With support for Windows, Linux …
Security considerations bring Software-plus-service and Software as a Service to the enterprise
Software-plus-service (S+S) and Software-as-a-service (SaaS) are next-generation software solutions for a number of today’s applications. Implementation flexibility, …
iTunes 10.2 fixes multiple security vulnerabilities
iTunes 10.2 comes with several new features, improvements and security fixes. ImageIO libpng is updated to version 1.4.3 to address multiple vulnerabilities, the most serious …
Wireshark 1.4.4 released
Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. Wireshark 1.4.4 fixes the following vulnerabilities: …
Cain & Abel 4.9.39 released
Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …
Nessus 4.4.1 released
The Nessus vulnerability scanner features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security …
Control physical and virtual machines on a network
Shavlik Technologies announced solutions that provide an approach to controlling all physical and virtual machines on a network. The company introduced NetChk Protect 7.8 and …
Featured news
Resources
Don't miss
- Booking.com data breach: Customer reservation data exposed
- AI adoption is outpacing the safeguards around it
- Agentic AI memory attacks spread across sessions and users, and most organizations aren’t ready
- Review: The Psychology of Information Security
- 29 million leaked secrets in 2025: Why AI agents credentials are out of control