software
Energy-efficient bcrypt cracking
Bcrypt is a password hashing scheme based on the Blowfish block cipher. It was designed to be resistant to brute force attacks and to remain secure despite of hardware …
FreeBSD ditches suspect hardware-based crypto
Buried in the “Security” section of a report on the FreeBSD Developer Summit held in September in Malta is a small but important note about the FreeBSD …
CyanogenMod introduces built-in SMS encryption
CyanogenMod developers have announced the fruit of several months of labor headed by Open Whisper Systems’ Moxie Marlinspike: a seamless implementation of TextSecure, …
1Password 4.1 for Mac adds new password updating, better search
Popular password manager 1Password for Mac reached version 4.1 that comes with some long-requested features, the most notable being a new Login (password) updating process. If …
Security gate for open doors
Internet crime has evolved to a full blown cyber-war, using internet servers as virtual soldiers to take down critical network infrastructures, or to steal information. While …
Legitimate apps bundled up with secret Bitcoin miner
As the value of Bitcoin continues to rise, a lot of people are trying to cash in on the craze. Some do it legally, by getting their own machines to perform the calculations …
Browser scan unveils an abundance of critical vulnerabilities
Through our Qualys BrowserCheck online tool we have collected data from over 1.4 million user computer scans and their respective browsers. From this research, we have found …
Secure cloud storage service MEGA releases iOS app
MEGA is a secure cloud storage service with 50 GB free storage space. The official MEGA iOS app is now available on the App Store. Features: Browse and manage your MEGA cloud …
F-Secure launches KEY, a secure password manager
F-Secure Key safely stores your passwords, user names and other credentials so that you can access them wherever you are through one master password. Your personal data is …
NTRU public key crypto released to open source community
RSA and ECC are the two most common public-key crypto systems in use today. At the 2013 Black Hat conference, researchers declared that the math for cracking encryption …
SAP Trojan based partially on Carberp code
Bit by bit, details about the first information-stealing Trojan discovered targeting SAP enterprise software are being unveiled, and Microsoft researchers have tied at least …
Python 3.3.3 fixes several security bugs
Python 3.3.3 fixes several security and a lot of overall bug fixes found in Python 3.3.2. This release fully supports OS X 10.9 Mavericks. In particular, this release fixes an …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users