F-Secure Rescue CD 3.11 released
The F-Secure Rescue CD is a free tool you can use to fix a computer that no longer starts because the operating system has been corrupted by malware. For more advanced users, …
Trend Micro offers enterprise Mac security
Trend Micro Security for Mac 1.5 is designed to protect corporate Mac users against viruses, spyware, blended threats and platform-independent Web-based attacks on the Mac …
BeEF: Browser exploitation framework
BeEF is a browser exploitation framework that demonstrates the collecting of zombie browsers and browser vulnerabilities in real-time. It provides a command and control …
Seagate hard drive with Serial ATA 6Gbit/second technology
Seagate began global shipments of Barracuda XT, a 7200RPM desktop hard drive featuring 2TB of storage capacity and a Serial ATA (SATA) 6Gb/second interface. The 3.5-inch …
Number of domain names reaches 184 million
Domain names continue to show growth across the Internet, according to the second quarter 2009 Domain Name Industry Brief published by VeriSign. The second quarter of 2009 …
Multi-vendor interoperability of iris recognition technology for Homeland Security
Unisys has demonstrated the ability to use multiple iris recognition technologies in a single system, eliminating the need for the Department of Homeland Security and others …
Centralized command and control center appliance for environments with no expertise
Proximex announced Proximex C100, a centralized command and control center appliance. Intended for security environments with little or no IT staff or expertise, it offers a …
UnboundID upgrades Directory Server Platform and LDAP SDK
UnboundID announced version 2.1 of the UnboundID Directory Server and version 1.1 of the UnboundID LDAP SDK for Java. The UnboundID Directory Server is based on a new identity …
Survey: Spam, and what it does to you
SPAMfighter announced the findings of its first quarterly SPAMFighter Community Watch Behavioral Survey, which aims to assess the current attitudes and behaviors towards spam. …
Hacking duo’s trial date set for November
American Chronicle reports that a trial date is set for Thomas Smith and David Edwards, two young men from Texas and South Carolina that allegedly conspired to damage a …
John the Ripper 1.7.3.4 released
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix …
Program to address security threat from network-attached devices
Responding to an often overlooked security risk, ICSA Labs introduced a new program to help enterprises safeguard against intrusions through network-connected devices such as …
Featured news
Resources
Don't miss
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC