software
![Pokemon GO](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111548/pokemon_go-1-400x200.jpg)
Pokémon GO gets full access to players’ Google account
Pokémon GO, the mobile augmented reality game that has become hugely popular in record time, brings with it a lot of unexpected dangers. Its popularity has been exploited by …
![Vivaldi browser](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113300/vivaldi-400x200.jpg)
Why the Vivaldi browser wants you to control everything
The number of Internet users has been growing steadily, and now stands at nearly 3.5 billion. And despite the growing popularity of mobile devices and specialized apps, the …
![Faraday](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111648/faraday-400x200.jpg)
Faraday: Collaborative pen test and vulnerability management platform
Faraday is an integrated multi-user penetration testing environment that maps and leverages all the knowledge you generate in real time. It gives CISOs a better overview of …
![explode](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113434/explode-400x200.jpg)
Exploit for GNU wget RCE flaw revealed
Technical details about a serious vulnerability affecting all but the latest version of the GNU wget software have been released online, along with PoC exploit scenarios. …
![key](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112900/key-400x200.jpg)
ApocalypseVM ransomware decrypter released
AV company Emsisoft has added yet another ransomware decrypter tool to its stable: a decrypter for ApocalypseVM. The tool works on the latest versions of the ransomware in …
![Pestudio](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111923/pestudio-400x200.jpg)
Pestudio: Initial malware assessment made simple
Malicious executables often attempt to hide their behavior and evade detection. By doing so, they present anomalies and suspicious patterns. Pestudio is a free tool that …
![Warberry Pi](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111930/warberrypi-400x200.jpg)
Tactical exploitation with Warberry Pi
WarBerry Pi was built for red team engagements where it’s essential to obtain as much information as possible in a short period of time, while going undetected. All you need …
![Hashcat](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111955/hashcat-400x200.jpg)
Developing Hashcat, a tool for advanced password recovery
As general-purpose computing on graphics processing units (GPGPU) became more viable around 2009, professional software developer Jens “atom” Steube wanted to …
![Google Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112134/google-chrome-400x200.jpg)
Google Chrome update includes 15 security fixes
Google has released Chrome 51.0.2704.79 to address multiple vulnerabilities for Windows, Linux, and OS X. Exploitation of some of these vulnerabilities may allow a remote …
![Tor browser](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112210/tor_browser-400x200.jpg)
Tor Browser 6.0 released
The Tor Browser lets you use Tor on Windows, OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112213/connection-400x200.jpg)
Improving software security through a data-driven security model
The current software security models, policies, mechanisms, and means of assurance are a relic of the times when software began being developed, and have not evolved along …
![Signal](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112327/signal-ios-400x200.jpg)
Review: Signal for iOS
Open Whisper Systems’ Signal is an encrypted voice and text communication application available for Android and iOS. The technology is built upon the …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?