Please turn on your JavaScript for this page to function normally.
WordPress 2.8.2 fixes XSS vulnerability

WordPress 2.8.2 fixes an XSS vulnerability. Comment author URLs were not fully sanitized when displayed in the admin. This could be exploited to redirect you away from the …

Device control and endpoint security for Mac users

CoSoSys released My Endpoint Protector for Mac. This device control and data loss prevention service for Mac users and network administrators offers the ability to proactively …

New book: “Automating System Administration with Perl”

If you do systems administration work of any kind, you have to deal with the growing complexity of your environment and increasing demands on your time. Automating System …

Nmap 5.00 released

Nmap (“Network Mapper”) is a free and open source utility for network exploration or security auditing. Version 5.00 is the first major release since 4.50 in 2007, …

New hardware security module from Thales

Thales announced Thales nShield Connect 6000, a fast network-attached hardware security module and the only one to offer dual, hot-swappable power supplies. HSMs are widely …

New software filtering client for laptops

SmoothWall announced the release of Mobile Guardian – a new software filtering client, designed to prevent roaming laptop users from accessing inappropriate and …

BitDefender for HTTP proxy for Linux released for beta testing

BitDefender announced that BitDefender for HTTP Proxy for Linux is available for beta testing. It offers advanced features, including: Real-Time Scanning of Internet Traffic: …

Endpoint security from Check Point

Check Point announced Check Point Endpoint Security R72, a new version of their single agent for endpoint security. New Check Point WebCheck browser security protects …

Juniper’s adaptive threat management solutions for distributed enterprises

Juniper Networks Adaptive Threat Management Solutions, based on a dynamic security infrastructure, deliver security at scale that is identity aware and application aware, …

Security code review service for threat identification

Comsec Consulting launched CODEFEND, a new application security service which combines technology and expert human analysis, for Outsourced Security Code Review and Threat …

Users voice key factors of virus protection

In an online survey conducted during May 2009, 9325 surfers told IT security specialist Avira about the criteria they use when choosing their virus protection. International …

First vascular recognition solution to earn certification

Fujitsu announced that the Fujitsu PalmSecure vascular biometric authentication technology has been certified under the International Common Criteria for Information …

Don't miss

Cybersecurity news