Please turn on your JavaScript for this page to function normally.
RSA takes a big data approach to help with high-risk threats

RSA, The Security Division of EMC, at RSA Conference Europe 2013 unveiled RSA Vulnerability Risk Management (VRM), a new software solution designed to help organizations …

Photoshop source code stolen, 38M users affected in Adobe hack

Remember the successful attack against Adobe’s networks made public earlier this month? Well, as it turns out, the damage is larger than initially thought. Early results …

WordPress 3.7 delivers important architectural updates

WordPress 3.7, named Basie, is available for download or update in your WordPress dashboard. Updates include: Updates while you sleep: With WordPress 3.7, you don’t have …

Mozilla releases add-on to reveal online data tracking

With a new version (1.0.2) released on Wednesday, Mozilla has once again put the spotlight on its Collusion add-on that aims to show users which first and third parties are …

Microsoft releases Sigcheck 2.0

Sigcheck is a command-line utility that shows file version number, timestamp information, and digital signature details, including certificate chains. Version 2.0 adds …

Secure file sharing for Mac with native OS X integration

Infrascale released FileLocker for Mac, with native OS X integration. OS X users now have direct access to File Locker’s Ultrasafe features as well as Private Cloud …

iPhone secure messaging with self-destruct mechanism via Wickr app

Wickr was one of the most interesting companies I was introduced to at this year’s RSA Conference in San Francisco. The company was one of the finalists of the …

Nmap cheat sheet

Network Mapper – better known by its shortened name Nmap – is one of the most long-lived security tools out there. Used for scanning computer networks for ports, …

Internet of Things starter kit from IBM and Libelium

IBM and Libelium released an Internet of Things Starter Kit to enable dozens of sensor applications ranging from monitoring parking spaces or air pollution to providing …

Facebook data mining tool uncovers your life

You know you shouldn’t post potentially damaging data on Facebook, but more often that not, your friends don’t think twice about it, and this can impact you even …

Can you trust the apps you use?

With the advent of smartphones, the word “app” has almost become a synonym for pleasure. Whatever you need, whatever you want is right there at your fingertips, …

How to sniff local network traffic on an unrooted Android device

Google Play hosts a number of applications that focus on local network traffic sniffing for Android devices, but for the majority of them you would first need to root the …

Don't miss

Cybersecurity news