software
GFI Software redesigns WebMonitor 2015
GFI Software announced GFI WebMonitor 2015, the latest version of the company’s Web filter, management and security solution for businesses. GFI completely redesigned …
Lessons learned developing Lynis, an open source security auditing tool
If you’ve been involved with information security for more than a decade, you’ve probably heard of Rootkit Hunter or rkhunter, a software whose primary goal is to …
Monitoring tool profiles user behavior to reveal human risk
BalaBit unveiled Blindspotter, an IT security tool that analyzes all user activity, including malicious events, occurring throughout IT systems. Blindspotter features …
Rapid7 releases Nexpose Ultimate
Rapid7 released Nexpose Ultimate, a vulnerability management solution that combines assessment of vulnerabilities and controls, vulnerability validation, and prioritized …
Bugzilla bug that could reveal other software flaws has been patched
A critical security vulnerability in the popular online bug-tracking-and-testing tool Bugzilla has been patched, and users are advised to update to new releases as soon as …
Researchers test EMET 5 protections, find them wanting
Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) has once again failed to stop an attack mounted by researchers working with Offensive Security, the company …
Unpatched systems and apps on the rise
As the number of software vulnerabilities increases, and people connect across personal and corporate devices using a multitude of different platforms each day, time and time …
Free tool tracks DNS changes in DNS zone files
Incorrect edits to DNS can have catastrophic consequences such as disconnecting an entire company website or its email servers and causing costly downtime. LogicMonitor …
Hong Kong protesters hit with malware, turn to “off-the-grid” chat app
The pro-democracy protests started by Hong Kong students’ and backed by the Occupy Central protesters (Central is the name of Hong Kong’s financial district) are …

Data Protection for Photographers
Today's high resolution digital cameras ensure that active photographers have to manage massive amounts of data. Keeping this data safe in the long run can present a …
Making one organization’s incident everyone’s defense
The Financial Services Information Sharing and Analysis Center (FS-ISAC), an organization focused on sharing critical cyber security threat information worldwide, and The …
Blackphone and Silent Circle announce bug bounty program
Blackphone and Silent Circle today announced the launch of their bug bounty program. Both companies’ mission is to enable secure and private communications for …
Featured news
Resources
Don't miss
- Microsoft fixes zero-day exploited for cyber espionage (CVE-2025-33053)
- OWASP Nettacker: Open-source scanner for recon and vulnerability assessment
- The path to better cybersecurity isn’t more data, it’s less noise
- How to build AI into your business without breaking compliance
- Android Enterprise update puts mobile security first