software
30+ bugs found in Google App Engine
Adam Gowdiak, CEO of Polish firm Security Explorations, has announced that his team of researchers have discovered over 30 serious security issues in the Java security sandbox …
Software security in a market for lemons
There is little doubt that it’s difficult to develop secure software. First, you need to be aware of the need for security, accepting it as an important element of …
Firefox 34 comes with critical security updates
Firefox 34 includes eight security updates, three of which are Critical, three High and two moderate. MSFA-2014-91 Privileged access to security wrapped protected objects …
VPN providers urged to update OpenVPN due to critical DoS bug
The OpenVPN Project has issued a new version of its popular open source software of the same name and is urging users to implement it, as it solves a critical denial of …
Intel acquires digital identity manager PasswordBox
Intel acquired PasswordBox, a provider of a cross-platform identity management service that gives users a way to log into all of their websites and applications from any …
Adobe urges users to implement critical out-of-band Flash Player update
For the second time in a month, Adobe has issued a security update for Flash Player. This out-of-band update finally fixes a critical vulnerability that could be misused by …
New Docker version solves critical bugs, update immediately
If you’re using Docker, the open source platform for building, shipping and running distributed applications on almost any platform, be sure to update to the latest …
Google open sources Firing Range, a test tool for web app security scanners
Google has open sourced another security tool: it’s called Firing Range, and it’s an effective testing ground for a variety of automated web application security …
Open Whisper Systems helps WhatsApp achieve end-to-end encryption
The immensely popular Whatsapp instant messenger has the potential to become an even more attractive option for users, as the company has partnered with Open Whisper Systems …
Cisco open sources Big Data security analytics framework
“Technically advanced attackers often leave behind clue-based evidence of their activities, but uncovering them usually involves filtering through mountains of logs and …
ReadyNAS OS offers 5 levels of data protection
NETGEAR is releasing a new version of its ReadyNAS operating system for its ReadyNAS family of desktop and rack-mount NAS devices. ReadyNAS OS 6.2 offers improvements in data …
Most of the top 100 paid Android and iOS apps have been hacked
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies. In addition to an increase in app hacks …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA