software
Copied Android apps sold on Google Play at higher prices
App developer Root Uninstaller claims that some of his original apps for the Android platform have been copied and are currently being sold on Google Play. He offers the …
Keycard: Unlock your Mac using an iOS device
Keycard allows you to pair your iPhone or other Bluetooth enabled device with your Mac to lock and unlock your computer. It detects when you’re leaving your desk, …
Improve your firewall auditing
As a penetration tester you have to be an expert in multiple technologies. Typically you are auditing systems installed and maintained by experienced people, often protective …
All Ruby on Rails versions affected by SQL injection flaw
Three new versions of popular open source web application framework Ruby on Rails have been released on Wednesday in order to fix an SQL injection vulnerability that affected …
Ubuntu comes to the phone
Canonical announced a smartphone interface for its operating system, Ubuntu, using all four edges of the screen for a more immersive experience. Ubuntu gives handset OEMs and …
Lancope releases new threat intelligence for detecting attacks
Lancope released new threat intelligence for monitoring global cyber attacks. Through its StealthWatch Labs Intelligence Center (SLIC), Lancope is now delivering two new …
Forensic access to encrypted BitLocker, PGP and TrueCrypt containers
ElcomSoft released Elcomsoft Forensic Disk Decryptor, a forensic tool providing access to information stored in disks and volumes encrypted with BitLocker, PGP and TrueCrypt. …
Compliance auditing with in-depth reporting
Paws Studio is the compliance auditing tool for workstations and servers which enables organizations to produce intelligent compliance reports. It includes pre-defined …
Secure stateless tokenization for enterprises
Voltage Security announced its Stateless Tokenization (SST) technology, a patent-pending data security solution that provides enterprises, merchants and payment processors …
Highest profile software failures of 2012
SQS compiled a list of the worst software failures over the past 12 months. This year’s annual survey is based on major software failures throughout 2012 and highlights …
Nmap 6: Network exploration and security auditing cookbook
Nmap 6: Network exploration and security auditing cookbook will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of …
Splunk releases Java and Python SDKs
Splunk announced new software development kits (SDKs) for Java and Python. SDKs make it easier for developers to customize and extend the power of Splunk Enterprise, enabling …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users