Static analysis technology for web application security
Coverity has extended static analysis to deeply understand both source code and modern web application architecture, providing greater accuracy and remediation guidance to …
Fake Amazon email leads to exploit kit
Fake Amazon order confirmations are hitting inboxes and trying to trick recipients into following any of the links to a page serving the Blackhole exploit kit. The email looks …
Mobile workspace offers a secure Windows OS on any computer
Imation announced Stealth Zone 2.1 boot-from-USB secure mobile workspace. This new version enhances data security by making it easier and more convenient for business …
McAfee enhances its cloud security platform
The McAfee Cloud Security Platform provides a framework that allows organizations to extend their security and policy enforcement into the cloud by securing the three primary …
World’s first secure private mobile carrier
New revelations about abuses by social networks and search giants are only the tip of the iceberg when it comes to security threats today. Not only are these organizations …
Create secure web applications with Sentinel Source
WhiteHat Security announced Sentinel Source, a solution for creating secure online applications from inception to launch. With the ability to track source code development for …
Manage, secure and support mobile users
Unisys announced its Mobility Solutions Suite of services designed to help organizations manage, secure and support mobile devices such as smartphones and tablets – as …
Lancope unveils new StealthWatch threat intelligence dashboards
Lancope announced that its StealthWatch System now includes four new dashboards for viewing threat intelligence surrounding network reconnaissance, internal malware …
Flame and Stuxnet are linked, say researchers
Kaspersky Lab researchers who have been rooting into the code of the Flame toolkit since its discovery believe to have unearthed definitive proof that, at one point in time, …
MySQL flaw allows attackers to easily connect to server
A simple but serious MySQL and MariaDB authentication bypass flaw has been revealed by MariaDB security coordinator Sergei Golubchik, and exploits targeting it have already …
Microsoft and the era of the cloud OS
Built on decades of experience gleaned from running massive datacenters at scale, Windows Server 2012 is the cloud-optimized server OS for customers of all sizes, and Windows …
Adobe delivers sandboxed Flash Player for Firefox users
Adobe released the newest version (11.3) of its Flash Player, with which its Protected Mode is now made available to Firefox users on Windows. “Our Protected Mode …
Featured news
Resources
Don't miss
- Brute-force attacks hammer Fortinet devices worldwide
- For $40, you can buy stolen police and government email accounts
- Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)
- AI security governance converts disorder into deliberate innovation
- Open-source flow monitoring with SENSOR: Benefits and trade-offs