software
Telegram Android app is a stalker’s dream
Popular instant messaging service Telegram provides optional end-to-end encrypted messaging and, in general, is highly focused on protecting user privacy.Despite these …
IBM cloud tool enables privacy-preserving user authentication
Identity Mixer, a new tool to protect a consumer’s personally identifiable information, is now generally available on IBM Cloud. The tool is built on years of cryptography …
Four ways an attacker can infiltrate an organization by diverting security solutions
Employing one of the many security solutions on the market today does not mean your organization is immune to infiltration – that much is clear from the constant string …
Network protocol analyzer Wireshark 2.0 released
Wireshark, the most popular network protocol analyzer, has reached version 2.0. It features a completely new user interface which should provide a smoother, faster user …
Analytics services are tracking users via Chrome extensions
It’s quite possible that, despite your belief that the Google Chrome is the safest browser there is and your use of extensions that prevent tracking, your online …
The top 7 improvements in Nmap 7
Nmap 7 is the product of three and a half years of work, nearly 3200 code commits, and more than a dozen point releases since the big Nmap 6 release in May 2012.The top 7 …
PwnBin: A script for scraping Pastebin for leaked API keys, SSH credentials
Pastebins, apart from being a great help for programmers as they offer a place where one can store text online for a set period of time and share it with others, are also …
Inside the largely unexplored world of mainframe security
The security of mainframe computers – the so-called “big iron”, which is mainly used by large organizations for critical applications, bulk data and …
Bug in Android Gmail app allows effective email spoofing
Yan Zhu, a Technology Fellow at the Electronic Frontier Foundation, has unearthed a flaw in the Gmail Android app that can lead to very effective phishing attacks.The flaw is …
Open source Twittor tool can control botnets via Direct Messages
A security researcher has created a tool that allows botnet masters to control their botnet by simply sending out commands via Twitter accounts.“I mostly wanted to …
Trojanized versions of 20,000 popular apps found secretly rooting Android devices
Lookout researchers have discovered some 20,000 apps that secretly root users’ phone and install themselves as system applications, which makes them able to access …
Firefox 42 is out, with many privacy and security improvements
Mozilla has released Firefox 42, and with it, a new feature that should increase user privacy online.It’s called Tracking Protection and it’s incorporated into the …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA