GFI Software redesigns WebMonitor 2015
GFI Software announced GFI WebMonitor 2015, the latest version of the company’s Web filter, management and security solution for businesses. GFI completely redesigned …
Linksys releases high performance 4X4 wireless AC router
Linksys unveiled its first 4×4 Wireless AC router aimed at households with multiple internet users as well as single users who use the internet for high bandwidth …
Easily exploitable Drupal bug can lead to total site compromise
Admins of sites that run Drupal 7 are advised to update to the latest version of the platform – version 7.32 – because it fixes a critical SQL injection …
New OpenSSL updates fix POODLE, DoS bugs
The OpenSSL Project has pushed out new releases of the popular eponymous open-source cryptographic library, which fix four serious vulnerabilities, including the POODLE …
Facebook doubles bounties for bugs in ads code
Facebook has announced that all vulnerabilities affecting the company’s ads code will now be worth twice as much to the bug hunters who find and responsibly disclose …
Tips for mitigating the financial impact of identity theft
With a number of large retailers and banks reporting massive data security breaches in the last year, leaving hundreds of millions of consumers’ personal information …
McAfee Next Generation Firewall integrates with key technologies
McAfee, part of Intel Security, announced the latest release of McAfee Next Generation Firewall, which now integrates with several key McAfee solutions and technologies, …
Cyber security coalition aims to change the game against malware
It’s good to see that “collaboration” is not just an empty word for the cyber security industry. Novetta Solutions announced it is leading a cyber security …
Microsoft patches two more 0-days actively used by attackers
With this month’s Patch Tuesday, Microsoft has provided patches for several critical vulnerabilities that allow remote code execution, some of which have been or are …
Lessons learned developing Lynis, an open source security auditing tool
If you’ve been involved with information security for more than a decade, you’ve probably heard of Rootkit Hunter or rkhunter, a software whose primary goal is to …
4 million UPnP devices may be vulnerable to attack
Akamai has observed the use of a new reflection and amplification DDoS attack that deliberately misuses communications protocols that come enabled on millions of home and …
POODLE vulnerability: The end of life of SSL 3.0
There is a critical security vulnerability in SSL 3.0 which allows attackers to calculate the plaintext of encrypted connections, and it will likely spell the end of the use …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads
 - Heisenberg: Open-source software supply chain health check tool
 - Securing real-time payments without slowing them down