Please turn on your JavaScript for this page to function normally.
Trust but verify: Mozilla execs invite researchers to audit their code

The recent revelations about NSA surveillance efforts, and especially the claims that the agency has been persuading or forcing software developers to put in backdoors into …

Multi-protocol SoftEther VPN becomes open source

In March 2013, a Japanese student by the name of Daiyuu Nobori set up VPN Gate, a free VPN service that he hoped would be used by Internet users who wish to avoid their …

Snapchat makes no apology for breach, announces app update

One good thing to come from the leak of usernames and phone numbers of some 4.6 million Snapchat users is that the company is now forced to patch the exploited …

Netwrix makes password management free to small businesses

Netwrix announced the availability of Netwrix Password Manager as a completely free offering to businesses with up to 100 users. “According to Forrester research, …

OpenX / Revive Adserver zero-day actively exploited in the wild

A zero-day vulnerability that allows attackers to gain back-end access to popular open-source advertising server OpenX Source has been discovered by Florian Sander, founder of …

SolarWinds enhances security tools

SolarWinds announced enhancements to several of its security management solutions, including SolarWinds Log & Event Manager, SolarWinds Firewall Security Manager and …

Shady Android AV pushed onto unsuspecting users

A deceptive advertising campaign pushing a shady antivirus solution is actively targeting Android users, warns Malwarebytes’ Armando Orozco. The pop-ups are triggered …

WhatsApp-themed spam campaign delivers malware

A new WhatsApp-themed spam campaign has been spotted targeting users of the popular IM service. The spam email claims to be a notification about a voice message someone left …

Top 100 Android apps hacked in 2013

One hundred percent of the Top 100 paid Android apps and 56 percent of the Top 100 paid Apple iOS apps have been hacked, according to Arxan. As the growth in mobile innovation …

Energy-efficient bcrypt cracking

Bcrypt is a password hashing scheme based on the Blowfish block cipher. It was designed to be resistant to brute force attacks and to remain secure despite of hardware …

FreeBSD ditches suspect hardware-based crypto

Buried in the “Security” section of a report on the FreeBSD Developer Summit held in September in Malta is a small but important note about the FreeBSD …

CyanogenMod introduces built-in SMS encryption

CyanogenMod developers have announced the fruit of several months of labor headed by Open Whisper Systems’ Moxie Marlinspike: a seamless implementation of TextSecure, …

Don't miss

Cybersecurity news