LATEST NEWS

Angler EK hijacks domain registrant credentials to create malicious pages

The Angler Exploit kit has adopted a new technique for dropping its malware.

Connecticut AG asks Lenovo for details on Superfish incident

Attorney General George Jepsen sent a letter to Lenovo's EVP on Friday.

Tsukuba trojan aimed at Japanese banking customers

The Tsukuba trojan like other proxy changers is not technically advanced but uses an interesting social engineering technique, researchers at IBM Trusteer found.

Alleged Anonymous hacker deported back to the U.S.

Alleged Anonymous member Matt DeHart was deported back to the U.S. and now faces child pornography charges.

FEATURED: Vulnerabilities

New SSL/TLS vulnerability, FREAK, puts secure communications at risk

The FREAK vulnerability can be exploited by attackers to obtain private information, including usernames and passwords.

Product Reviews

Rapid7 Nexpose Ultimate Appliance

starstarstarstarstar
Rapid7 Nexpose Ultimate is a comprehensive vulnerability scanner that is determined to convince you of its findings.

Secunia Corporate Software Inspector CSI

starstarstarstar½
Secunia Corporate Software Inspector (CSI) inspects software on any Windows or Android device with an agent.

Skybox View Enterprise Suite

starstarstarstarstar
The Skybox Enterprise Suite is an enterprise vulnerability assessment tool that is deployed to aid in vulnerability and threat management, as well as security policy management.

Tenable Network Security Nessus

starstarstarstarstar
Tenable Network Security Nessus is one of the most comprehensive and widely deployed vulnerability assessment tools.

OPINIONS

Three reasons native mobile apps need extra security love

Three reasons native mobile apps need extra security love

Aside from the many benefits native apps provide, enterprises face challenges they need to deal with to make sure they aren't exposed to the new security risks native apps introduce.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US