Security Software
WindowsWindows

Data Guardian 3.1.2
| updated 26 March 2014

Data Guardian is a secure database application with up to 448-bits of Blowfish encryption — regardless of how sensitive your data is.

Mac OS XMac OS X

GPG Suite 2013.10.22
| updated 26 March 2014

Use GPG Suite to encrypt, decrypt, sign and verify files or messages. Manage your GPG Keychain with a few simple clicks and experience the full power of GPG easier than ever before.

ClamXav 2.6.2
| updated 26 March 2014

ClamXav is a freeware virus checker for Mac OS X.

Espionage 3.5.3
| updated 26 March 2014

Espionage is designed to integrate with Apple's Finder, so that you can protect only the data that you want protected, without having to resort to any special "vaults".

1Password 4.1.2
| updated 26 March 2014

1Password can create strong, unique passwords for you, remember them, and restore them, all directly in your web browser.

Data Guardian 3.1.2
| updated 26 March 2014

Data Guardian is a secure, Universal Binary, database application for storing passwords, credit card numbers, addresses, notes, customer databases, and more.

LinuxLinux

ModSecurity 2.8.0
| updated 16 April 2014

ModSecurity is an open source intrusion detection and prevention engine for web applications.

Samhain 3.1.0
| updated 26 March 2014

Samhain is an open source file integrity and host-based intrusion detection system.

strongSwan 5.1.2
| updated 26 March 2014

strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels

Dropbear SSH Server 2014.63
| updated 26 March 2014

Dropbear is an SSH 2 server, designed to be usable in small memory environments.

Dante 1.4.0
| updated 18 November 2013

Dante is a circuit-level firewall/proxy that can be used to provide convenient and secure network connectivity to a wide range of hosts.




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Apr 17th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //