Please turn on your JavaScript for this page to function normally.
FCA US
Fiat Chrysler Automobiles launches bug bounty program

The convergence of connectivity technology and the automotive industry is creating a more enjoyable driving experience. Features such as self-diagnostics, keyless entry and …

Vivaldi browser
Why the Vivaldi browser wants you to control everything

The number of Internet users has been growing steadily, and now stands at nearly 3.5 billion. And despite the growing popularity of mobile devices and specialized apps, the …

Faraday
Faraday: Collaborative pen test and vulnerability management platform

Faraday is an integrated multi-user penetration testing environment that maps and leverages all the knowledge you generate in real time. It gives CISOs a better overview of …

brain
US artificial intelligence market set to surge

The artificial intelligence market in the US is projected to grow at a CAGR of 75% until 2021 on account of increasing AI technology adoption, according to TechSci Research. …

meeting room
How executives really feel about infosec reports

More than half of IT and security executives will lose their jobs as a result of failing to provide useful, actionable information. While the majority of board members say …

Pestudio
Pestudio: Initial malware assessment made simple

Malicious executables often attempt to hide their behavior and evade detection. By doing so, they present anomalies and suspicious patterns. Pestudio is a free tool that …

Warberry Pi
Tactical exploitation with Warberry Pi

WarBerry Pi was built for red team engagements where it’s essential to obtain as much information as possible in a short period of time, while going undetected. All you need …

Hashcat
Developing Hashcat, a tool for advanced password recovery

As general-purpose computing on graphics processing units (GPGPU) became more viable around 2009, professional software developer Jens “atom” Steube wanted to …

0patch
0patch: Microscopic cures for big security holes

Software vulnerabilities are one of today’s most significant information security issues. Disclosing high profile vulnerabilities has become tremendously rewarding, to the …

users
The future of Identity Management: Passwords and the cloud

Compromised credentials are still the cause of almost a quarter of all data breaches, according to the Cloud Security Alliance. With a surge in cybercrime, it’s no wonder that …

Eyes
The life of a social engineer: Hacking the human

A clean-cut guy with rimmed glasses and a warm smile, Jayson E. Street looks nothing like the stereotypical hacker regularly portrayed in movies (i.e. pale, grim and …

Gboard
Gboard enhances your keyboard, but what about your privacy?

Gboard is a Google app for your iPhone that lets you search and send information, GIFs, emojis and more, right from your keyboard. You can search and send anything from …

Don't miss

Cybersecurity news