software
Kotlin programming language for JVM and Android reaches version 1.0
Kotlin is an open source programming language for JVM and Android that combines OO and functional features and is focused on interoperability, safety, clarity and tooling …
Rooting malware lurking in third party Android app stores
Downloading Android apps from Google Play might not always be a safe proposition, but downloading them from third party app stores is definitely less safer. According to Trend …
Flaw in Sparkle Updater for Mac opens users of popular apps to system compromise
A security engineer has recently discovered a serious vulnerability in Sparkle, the widely used open source software update framework for Mac applications, that could be …
Network forensic analysis tool NetworkMiner 2.0 released
NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any …
Harnessing artificial intelligence to build an army of virtual analysts
Enterprises of all types and sizes are continually probed and targeted by cyber attackers. It doesn’t matter whether they are after the company’s or their …
Year-old crypto flaw in Socat created a potentially intentional backdoor
A backdoor has been discovered in Socat, a popular open-source network administration tool similar to Netcat, and its unclear how it hasn’t been spotted earlier or at …
“Deliberately hidden” backdoor found on US government’s comms system
Researchers from Austrian infosec outfit SEC Consult have unearthed what they dubbed a “deliberately hidden backdoor account” in NX-1200, a network controller …
OpenWPM: An automated, open source framework for measuring web privacy
Among the speakers at the first ever Privacy Con, organized by the US Federal Trade Commission (FTC) and held last Thursday in Washington, DC, was Steven Englehard, a Ph.D. …
LostPass: A worryingly simple phishing attack aimed at LastPass users
Security researcher (and Praesido CTO) Sean Cassidy has demonstrated at ShmooCon how easy it can be for hackers to steal LastPass users’ email, password, and two-factor …
Flaw allows malicious OpenSSH servers to steal users’ private SSH keys
Qualys researchers have discovered two vulnerabilities in the popular OpenSSH implementation of the secure shell protocol, one of which (CVE-2016-0777) could be exploited by …
Most companies do nothing to protect their mobile apps
There’s a wide disparity between consumer confidence in the level of security incorporated into mobile health and finance apps and the degree to which organizations …
Google researchers finds critical flaws in Trend Micro AV solution
If you are using Trend Micro’s Maximum Security 10 solution for Windows, you might want to update it to the latest available version as soon as possible. If you …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA