Please turn on your JavaScript for this page to function normally.
Warberry Pi
Tactical exploitation with Warberry Pi

WarBerry Pi was built for red team engagements where it’s essential to obtain as much information as possible in a short period of time, while going undetected. All you need …

Hashcat
Developing Hashcat, a tool for advanced password recovery

As general-purpose computing on graphics processing units (GPGPU) became more viable around 2009, professional software developer Jens “atom” Steube wanted to …

Google Chrome
Google Chrome update includes 15 security fixes

Google has released Chrome 51.0.2704.79 to address multiple vulnerabilities for Windows, Linux, and OS X. Exploitation of some of these vulnerabilities may allow a remote …

Tor browser
Tor Browser 6.0 released

The Tor Browser lets you use Tor on Windows, OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser …

connection
Improving software security through a data-driven security model

The current software security models, policies, mechanisms, and means of assurance are a relic of the times when software began being developed, and have not evolved along …

Signal
Review: Signal for iOS

Open Whisper Systems’ Signal is an encrypted voice and text communication application available for Android and iOS. The technology is built upon the …

Hands
OWASP set to address API security risks

OWASP has started a new project and is set to publish a new guide on security risks. The issue they aim to tackle this time is API security. The new OWASP API Security Project …

teslacrypt
The end of TeslaCrypt: Master decryption key released

The operators of TeslaCrypt ransomware have decided to close up shop and have published a master key that decrypts the files encrypted by the malware. They also wrote that the …

Gboard
Gboard enhances your keyboard, but what about your privacy?

Gboard is a Google app for your iPhone that lets you search and send information, GIFs, emojis and more, right from your keyboard. You can search and send anything from …

Microsoft logo
Microsoft releases eight critical updates

Microsoft has released its May patch updates and it was a rather large deployment with 16 total updates this month. The critical versus important updates were split down the …

magnify
Attackers use open source security tools for targeted cyberespionage

Kaspersky Lab researchers have uncovered a new trend among cyberespionage threat actors: instead of developing customized hacking tools or buying them from third-party …

Nexus
Presidential primary election apps may expose sensitive data

Did you know that there are over 1,200 Android apps, both official and unofficial, that help voters keep track of the happenings in the US presidential primary? Better yet, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools