Please turn on your JavaScript for this page to function normally.
15,435 vulnerabilities across 3,870 applications were recorded in 2014

In 2014, 15,435 vulnerabilities were discovered according to data from Secunia Research. The vulnerabilities are spread across 3,870 applications published by 500 different …

Mobile apps are not being tested for insecure behavior

Enterprises are not doing nearly enough to understand which mobile app behaviors hitting their networks and data are risky, nor are they testing apps for those risky behaviors …

Old Adobe Flex SDK bug still threatens users of many high-profile sites

An old vulnerability affecting old releases of the Adobe Flex SDK compiler can be exploited to compromise user data of visitors to many popular sites, including three of most …

Tails 1.3.1 emergecy release fixes security issues

Tails 1.3.1, is out. This is an emergency release, triggered by an unscheduled Firefox release meant to fix critical security issues. This version fixes numerous security …

Scammers use Whatsapp calling feature as a lure

Survey scammers and adware peddlers continue to advantage of the interest Whatsapp users have in the quietly rolled out Free Voice Calling feature. According to …

Why you shouldn’t ignore change auditing

Rupesh Kumar is the Director of Lepide Software. In this interview, he discusses the benefits of change auditing. What are the benefits of using change auditing? What security …

Google aims to make Play Store safer, sets up human app review team

The time has come for Google to add some more hoops for Android app developers to jumpt through in order to get their offering accepted to the Google Play store. The first …

Many Android and iOS apps still vulnerable to FREAK attacks

Your browser may no longer be vulnerable to FREAK attacks, but what about the mobile apps you use? According to FireEye researchers, who have tested the most popular apps both …

When it comes to cloud apps, companies are left in the dark

More than two-thirds (67 per cent) of organizations admit that unauthorized cloud applications are being implemented without IT’s knowledge or involvement, and …

Microsoft releases EMET 5.2

Microsoft has released version 5.2 of its Enhanced Mitigation Experience Toolkit (EMET), a free utility that can detect and block exploitation techniques that are commonly …

Yahoo announces email encryption plugin, password-free logins

Yahoo email users will soon be able to encrypt the emails they send out by simply clicking on a button. In addition to this, users will be able to effectively forget their …

Students create open source, cross-platform memory scanning tool

Mozilla has unveiled the result of a successful project executed by a group of Computer Science students from Argentina: it’s called Masche, and it’s an open …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools