Please turn on your JavaScript for this page to function normally.
Researchers beat Google’s Bouncer

When earlier this year Google introduced Bouncer – an automated app scanning service that analyzes apps by running them on Google’s cloud infrastructure and …

Detect and shut down rogue mobile apps

To counter the emergence of malicious and unauthorized apps appearing on mobile app stores, RSA introduced the RSA FraudAction Anti Rogue App Service designed to detect and …

First holistic security platform unveiled at Black Hat

AccessData released Cyber Intelligence & Response Technology 2 (CIRT 2), a platform that integrates network and computer forensics, malware analysis, large-scale data …

Hidden security risks of top mobile apps

Appthority cast a spotlight on the hidden behaviors of the top free mobile apps. The report reveals the security issues raised by the BYOD movement, app market fragmentation …

CryptoAuditor: Privileged user access auditing

SSH Communications Security launched CryptoAuditor at the Black Hat USA 2012 conference. It helps prevent data loss across encrypted secure shell, RDP and SFTP traffic with …

Microsoft Security Toolkit delivers new defensive technology

Microsoft’s Trustworthy Computing Group today released the Enhanced Mitigation Experience Toolkit (EMET) 3.5 Technology Preview, which includes new Return Oriented …

Free advanced evasion technique testing software

Stonesoft released Evader, the first software-based testing tool that empowers organizations to test their network security solutions’ ability to withstand advanced …

Penetration testing tool masquerades as surge protector

In the same way that a hardware keylogger may remain undetected by office workers, Power Pwn – a newly created piece of hardware resembling a power strip or surge …

Bruce Schneier: Trust, security and society

Human societies run on trust. Every day, we all trust millions of people, organizations, and systems — and we do it so easily that we barely notice. But in any system of …

Security vulnerabilities of DVB chipsets

This video from Hack in The Box Amsterdam 2012 focuses on the security of audio and video MPEG streams broadcasted to subscribers via their set-top-boxes by a digital …

Cuckoo Sandbox: Automated malware analysis

Cuckoo Sandbox is an open source automated malware analysis system. It started as a Google Summer of Code 2010 project with The Honeynet Project and evolved into being one of …

Getting ahead of the security poverty line

Being stuck below the security poverty line isn’t about budget, it’s about attitude, motivation, and focusing not simply on basic compliance but rather on your …

Don't miss

Cybersecurity news