software
Android hack tool harvests info from PCs
Stealing information is a piece of cake if you can manage to get malware on the target’s Windows computer, but did you know that it can also be as easy as connecting …
Abuse of mobile app permissions
McAfee Labs found that under the camouflage of “free” apps, criminals are able to get consumers to agree to invasive permissions that allow scammers to deploy …
Explore, analyze and visualize data in Hadoop
Splunk announced the beta version of Hunk: Splunk Analytics for Hadoop, a new software product that integrates exploration, analysis and visualisation of data in Hadoop. Hunk …
Advanced threat detection from Cylance available for free
The Cylance PrivateDETECT for endpoints is now ready for broad beta consumption as limited time freeware. Cylance’s technological approach is to apply big math and …
Firefox 22 delivers 14 security updates
Mozilla released Firefox 22, which includes 14 security updates: four are critical, six high, three moderate and one low. Fixed in this version: MFSA 2013-62 Inaccessible …
Google implements malware scan for submissions to Chrome Web Store
Late last week, Google has announced that submissions to the Chrome Web Store will, from now on, be checked for malware. Mimicking the Android Bouncer program incorporated …
Tool for IT challenges and legal requests
Kroll Ontrack announced Ontrack PowerControls 7.0. Complete with Microsoft Exchange Server 2013 and Microsoft SharePoint Server 2013 support as well as new functionality for …
How to detect hidden administrator apps on Android
Following the discovery of a new Android Trojan that uses several errors and vulnerabilities in the Android OS to make analysis harder for researchers and to remain hidden …
CyanogenMod founder aims to thwart data-grabbing apps
There’s some very good news for users of CyanogenMod, one of the most popular modified Android firmware on the market: its founder and main developer Steve Kondik (aka …
Microsoft releases Enhanced Mitigation Experience Toolkit 4.0
Microsoft has announced the release of version 4.0 of its popular Enhanced Mitigation Experience Toolkit (EMET), a free utility that helps prevent memory corruption …
F-Secure advances fight against exploits
Exploitation of software vulnerabilities has become one of the most popular ways to gain access to users’ machines, but F-Secure is reinforcing its exploit defenses with …
Log analysis and alert management platform
RandomStorm has released its new integrated log analysis, HIDS and file integrity platform, StormAgent. StormAgent automates protective monitoring of network hosts, reducing …