software

ISC’s infocon turns yellow to reflect critical impact of Juniper backdoors
SANS Institute’s Internet Storm Center has raised its infocon status – the status of the condition of the Internet infrastructure – from green to yellow, …

Human error reduces security offered by encryption apps
Crypto phones – whether they are hardware devices or mobile apps – are a great way to assure that your VoIP communications remain private, but the security and …

GCHQ open sources Gaffer, a data collection and mining framework
GCHQ, the UK equivalent of the US National Security Agency (NSA), has released on Monday the source code of Gaffer, a graph database that optimised for “retrieving data …
End-to-end encrypted database ZeroDB is now open source
ZeroDB, an end-to-end encrypted database whose release was announced earlier this year, is now open source. Developers MacLane Wilkison and Michael Egorov changed the license …
Signal secure messaging app now available on the desktop
The Open Whisper Systems nonprofit has released the beta version of their Signal secure messaging app for desktop computers.Signal is often recommended by privacy-minded …
Flaws in medical data management system can be exploited to modify patient information
Two vulnerabilities found in v3.3 of Epiphany’s Cardio Server ECG Management System, a popular system that is used to centralize and manage patient data by healthcare …
Custom secure apps are gaining popularity in the enterprise
It looks like organizations are increasingly building custom secure apps. Among Good Powered by BlackBerry customers who are building custom apps, the average organization has …
Telegram Android app is a stalker’s dream
Popular instant messaging service Telegram provides optional end-to-end encrypted messaging and, in general, is highly focused on protecting user privacy.Despite these …
IBM cloud tool enables privacy-preserving user authentication
Identity Mixer, a new tool to protect a consumer’s personally identifiable information, is now generally available on IBM Cloud. The tool is built on years of cryptography …
Four ways an attacker can infiltrate an organization by diverting security solutions
Employing one of the many security solutions on the market today does not mean your organization is immune to infiltration – that much is clear from the constant string …
Network protocol analyzer Wireshark 2.0 released
Wireshark, the most popular network protocol analyzer, has reached version 2.0. It features a completely new user interface which should provide a smoother, faster user …
Analytics services are tracking users via Chrome extensions
It’s quite possible that, despite your belief that the Google Chrome is the safest browser there is and your use of extensions that prevent tracking, your online …
Featured news
Resources
Don't miss
- Data-stealing VS Code extensions removed from official Marketplace
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools
- Third-party cyber risks and what you can do