Please turn on your JavaScript for this page to function normally.
Researchers exploit flaw to tie Secret users to their secrets

The secrets you share on Secret, the popular app that allows people to share messages anonymously within their circle of friends, friends of friends, and publicly, can be …

Tool restores SynoLocker-encrypted files

Security company F-Secure has created a tool that could help SynoLocker victims get their files back, but it only works if they have received – bought – the …

Control Android app permissions with NativeWrap

Tired with using mobile apps that demand unneeded permissions that open the door to data collection and worse? Researchers from North Carolina State University have come up …

Critical Delphi and C++Builder VCL library bug found

A buffer overflow vulnerability that could be exploited to execute malicious code has been discovered in the Visual Component Library (VCL) library of Embarcadero’s …

Most popular Android apps open users to MITM attacks

An analysis of the 1,000 most popular free Android apps from the Google Play store has revealed a depressing fact: most of them sport an SSL/TLS vulnerability that can be …

NIST vetting guide helps in testing mobile apps

While many mobile device apps such as a calendar or collaboration tools are very handy and can improve productivity, they can also introduce vulnerabilities that can put …

Analysis reveals many malicious Chrome extensions

An analysis of 48,332 browser extensions from the Chrome web store has revealed 130 outright malicious and 4,712 suspicious extensions, some of which have been downloaded by …

API security for connecting the enterprise cloud

In this interview, Don Bergal, COO at Managed Methods, answers questions regarding security around API based connections between an enterprise and the hybrid cloud. What …

GFI WebMonitor 2015 Beta 1 released

Beta 1 of a totally revamped GFI WebMonitor is now available for preview. GFI WebMonitor 2015 is a new, powerful version that really gives sysadmins the tools to manage …

Splunk App for Stream released

Splunk announced the availability of the Splunk App for Stream, which offers a new software approach for capturing real-time streaming wire data. The app is free for Splunk …

Serious flaws in cell phone carrier control software found

At the Black Hat conference this week, two Accuvant researchers have disclosed serious security flaws in the carrier control software used in over 2 billion cellular devices …

CIA’s venture firm CISO offers singular solutions for cyber problems

In a eclectic keynote delivered to the Black Hat conference audience, Dan Geer, CISO at In-Q-Tel, made known his thoughts on and ideas about a number of things: from Internet …

Don't miss

Cybersecurity news