software
Sniff and intercept web session profiles on Android
FaceNiff is an Android app that allows you to sniff and intercept web session profiles over the Wi-Fi that your mobile is connected to. It is possible to hijack sessions only …
Reveal Facebook passwords stored in Web browsers
Logins and passwords to various Web resources are routinely stored or cached in Web browsers to speed up access to protected resources. While it is possible to extract cached …
Apple security update bypassed after 8 hours
It took only eight hours for the malware developers behind the MacDefender and its variants to come up with a way to bypass the security update pushed out by Apple. According …
Anti-evasion readiness test tool and service
Stonesoft today announced its anti-evasion readiness test service. This service tests how well an organization’s critical digital assets are being protected against …
Physical, logical and mobile authentication in one software
Entrust released IdentityGuard 10.0, which brings together security solutions for physical, logical and mobile access. This latest update to Entrust’s authentication …
Flashback: Encrypted backups for Android
Flashback provides encrypted backups to the cloud, giving you reliable access to your data along with the peace of mind that it’s secure. Flashback allows you to backup …
Wireshark 1.4.7 released
Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. The following vulnerabilities have been fixed: …
Apple includes malware removal in security update
Apple just released Security Update 2011-003 which can be downloaded and installed via Software Update preferences, or from Apple Downloads. This is a small update weighing …
Encrypt files on Mac with BestCrypt
Jetico announced that their popular BestCrypt Container Encryption software now offers full compatibility with Mac computers. The software delivers data protection. Selected …
Web Application Attack and Audit Framework 1.0 released
The Web Application Attack and Audit Framework’s (w3af) goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend. …
iPhone hardware encryption investigated
Users of Apple iPhone devices accumulate huge amounts of highly sensitive information stored in their smartphones. Historical geolocation data, viewed Google maps and routes, …
phpMyAdmin redirection weakness and script insertion vulnerability
A weakness and a vulnerability have been reported in phpMyAdmin, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to …
Featured news
Sponsored
Don't miss
- How AI will shape the next generation of cyber threats
- AWS security essentials for managing compliance, data protection, and threat detection
- Consumer privacy risks of data aggregation: What should organizations do?
- All Google Cloud users will have to enable MFA by 2025
- GoZone ransomware accuses and threatens victims