Please turn on your JavaScript for this page to function normally.
IBM cloud tool enables privacy-preserving user authentication

Identity Mixer, a new tool to protect a consumer’s personally identifiable information, is now generally available on IBM Cloud. The tool is built on years of cryptography …

Four ways an attacker can infiltrate an organization by diverting security solutions

Employing one of the many security solutions on the market today does not mean your organization is immune to infiltration – that much is clear from the constant string …

Network protocol analyzer Wireshark 2.0 released

Wireshark, the most popular network protocol analyzer, has reached version 2.0. It features a completely new user interface which should provide a smoother, faster user …

Analytics services are tracking users via Chrome extensions

It’s quite possible that, despite your belief that the Google Chrome is the safest browser there is and your use of extensions that prevent tracking, your online …

The top 7 improvements in Nmap 7

Nmap 7 is the product of three and a half years of work, nearly 3200 code commits, and more than a dozen point releases since the big Nmap 6 release in May 2012.The top 7 …

PwnBin: A script for scraping Pastebin for leaked API keys, SSH credentials

Pastebins, apart from being a great help for programmers as they offer a place where one can store text online for a set period of time and share it with others, are also …

Mainframe access
Inside the largely unexplored world of mainframe security

The security of mainframe computers – the so-called “big iron”, which is mainly used by large organizations for critical applications, bulk data and …

Bug in Android Gmail app allows effective email spoofing

Yan Zhu, a Technology Fellow at the Electronic Frontier Foundation, has unearthed a flaw in the Gmail Android app that can lead to very effective phishing attacks.The flaw is …

Open source Twittor tool can control botnets via Direct Messages

A security researcher has created a tool that allows botnet masters to control their botnet by simply sending out commands via Twitter accounts.“I mostly wanted to …

Trojanized versions of 20,000 popular apps found secretly rooting Android devices

Lookout researchers have discovered some 20,000 apps that secretly root users’ phone and install themselves as system applications, which makes them able to access …

Firefox 42 is out, with many privacy and security improvements

Mozilla has released Firefox 42, and with it, a new feature that should increase user privacy online.It’s called Tracking Protection and it’s incorporated into the …

Open source tool checks for vulnerabilities on Android devices

OEMs like Samsung and HTC run heavily customized versions of Android. Unfortunately, the OEM patch deployment infrastructure is disorganized and too often end users are left …

Don't miss

Cybersecurity news