software
Vulnerabilities in WhatsApp Web affect 200 million users globally
Significant vulnerabilities can exploit WhatsApp Web, the web-based extension of the popular WhatsApp application for phones.The exploit can allow attackers to trick victims …
Rudra: Framework for automated inspection of network capture files
In this podcast recorded at Black Hat USA 2015, Ankur Tyagi, Malware Research Engineer at Qualys, talks about Rudra, a framework for automated inspection of network capture …
Open source Sleepy Puppy tool finds XSS bugs in target apps and beyond
Since Monday, security pros can add another XSS-finding tool to their arsenal, as Netflix has open sourced their cross-site scripting payload management framework dubbed …
Popular Android AppLock app full of gaping security holes
AppLock, by DoMobile, is a very popular Android app for limiting access to certain content on the device (text messages, photos, videos, etc.). The user decides what content …
Verizon and Splunk deliver actionable threat intelligence
Verizon Enterprise Solutions launched its Data Breach Investigations Report (DBIR) app for Splunk software. The new free downloadable app helps take the guess work out of …
Spotting malicious apps on Android markets just got easier
“Spotting malicious apps before they are offered for download and/or removing them is a tough challenge for every online Android app marketplace, including Google Play, …
JetAudio and JetVideo media player vulnerability allows arbitrary code execution
An arbitrary code execution in the JetAudio Basic (v8.1.3) and JetVideo media players for Windows allows potential attackers to craft a malicious .asf file that could …
Open source auditing with Lynis
Lynis is an open source security auditing tool. Commonly used by system administrators, security professionals and auditors, to evaluate the security defenses of their …
Evaluating the security of open source software
The Core Infrastructure Initiative (CII), a project managed by The Linux Foundation, is developing a new free Badge Program, seeking input from the open source community on …
Mozilla is experimenting with improved Private Browsing
Mozilla Foundation is again aiming to boost the privacy of Firefox users, and is beginning to test a new, improved kind of Private Browsing.“All major browsers offer …
Redefining security visualization with Hollywood UI design
Most security interfaces today leave a lot to be desired, and many security pros are gaming enthusiasts, accustomed to a sharp and engaging virtual world. ProtectWise CEO …
OpenSSH 7.0 deprecates weak, legacy and unsafe cryptography
OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. Additionally, it provides secure tunneling …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA