software
Intel strengthens security of its Core vPro platform
Intel announced the availability of its 3rd Generation Intel Core vPro processor-based platforms for business and intelligent systems. New capabilities embed security at every …
Adobe privacy solution for advertisers and publishers
Adobe announced enhancements to Adobe TagManager, creating a flexible privacy solution that helps digital advertisers and publishers give consumers notice and control over how …
Forensic access to iCloud backups
iPhone users have several options to back up the content of their devices. They can backup information stored in their device such as contacts, pictures, call logs and data …
McAfee and Intel protect the critical infrastructure together
McAfee announced a collaboration with Intel to better protect the world’s energy utility ecosystem, including generation, transmission and distribution, from increased …
Android remote systems administration tools
Cura is a mobile phone application bundle of remote systems administration tools. It provides a personalized terminal emulator, a syslog module that allows for reading logs …
Alternative app marketplaces prove profitable for cybercriminals
Avast researchers discovered a new batch of fake alternative marketplaces for downloading smartphone apps that trick users into sending premium rate SMS messages. Using a …
Secure online voting on iOS and Android
Scytl announced today the successful implementation of its online voting encryption technology for use on Android and iOS. By encrypting the ballot on the voter’s device …
Fuzz-o-Matic finds critical flaw in OpenSSL
Codenomicon helped identify and a critical flaw in widely-used encryption software. A flaw in the OpenSSL handling of CBC mode ciphersuites in TLS 1.1, 1.2 and DTLS can be …
FixMeStick: USB device for removing malware
FixMeStick has launched the first ever, consumer-ready USB device for removing viruses from infected PCs. The principles of the FixMeStick are not new to security IT …
Digital Forensics with Open Source Tools
Proprietary digital forensics tools have long been popular with the majority of forensic practitioners, but there are also open source ones that can come very handy. The book …
Fake mobile AV apps offered on Google Play
Downloading apps from Google Play, the official online Android app market, is not without its dangers. Even though Google has been scanning the offered apps for malware by …
Trend Micro releases SecureCloud key management system
Trend Micro announced a product development initiative using Apache CloudStack currently in incubation at the Apache Software Foundation, giving Trend Micro first-mover …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025