Please turn on your JavaScript for this page to function normally.
A closer look at Acunetix Web Vulnerability Scanner

Acunetix Web Vulnerability Scanner automatically checks your web applications for SQL Injection, XSS and other web vulnerabilities. Features: AcuSensor Technology SQL …

California phone kill-switch law could lead to abuse

On Monday, California Governor Jerry Brown signed into law a bill (SB 962) that will require any smartphone sold in the state after July 1, 2015, to include a software or …

10 most significant software security design flaws

The IEEE Center for Secure Design, a cybersecurity initiative focused on the identification of software design flaws, released a report based on real-world data collected and …

The synergy of hackers and tools at the Black Hat Arsenal

Black Hat USA 2014 recently welcomed more than 9,000 of the most renowned security experts – from the brightest in academia to world-class researchers and leaders in the …

New Chrome fixes 50 security issues, bug hunter gets $30k

Having implemented 50 security fixes, the Google Chrome team has pushed out a new stable version of the popular browser. The company hasn’t shared many bug details since …

Facebook to fix flaw that can force iPhones to make calls

Facebook will soon be pushing out an update to its iOS Messenger app meant to patch a vulnerability that could allow attackers to place pricy calls from users’ phones by …

Researchers exploit flaw to tie Secret users to their secrets

The secrets you share on Secret, the popular app that allows people to share messages anonymously within their circle of friends, friends of friends, and publicly, can be …

Tool restores SynoLocker-encrypted files

Security company F-Secure has created a tool that could help SynoLocker victims get their files back, but it only works if they have received – bought – the …

Control Android app permissions with NativeWrap

Tired with using mobile apps that demand unneeded permissions that open the door to data collection and worse? Researchers from North Carolina State University have come up …

Critical Delphi and C++Builder VCL library bug found

A buffer overflow vulnerability that could be exploited to execute malicious code has been discovered in the Visual Component Library (VCL) library of Embarcadero’s …

Most popular Android apps open users to MITM attacks

An analysis of the 1,000 most popular free Android apps from the Google Play store has revealed a depressing fact: most of them sport an SSL/TLS vulnerability that can be …

NIST vetting guide helps in testing mobile apps

While many mobile device apps such as a calendar or collaboration tools are very handy and can improve productivity, they can also introduce vulnerabilities that can put …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools