software
Spotting malicious apps on Android markets just got easier
“Spotting malicious apps before they are offered for download and/or removing them is a tough challenge for every online Android app marketplace, including Google Play, …
JetAudio and JetVideo media player vulnerability allows arbitrary code execution
An arbitrary code execution in the JetAudio Basic (v8.1.3) and JetVideo media players for Windows allows potential attackers to craft a malicious .asf file that could …
Open source auditing with Lynis
Lynis is an open source security auditing tool. Commonly used by system administrators, security professionals and auditors, to evaluate the security defenses of their …
Evaluating the security of open source software
The Core Infrastructure Initiative (CII), a project managed by The Linux Foundation, is developing a new free Badge Program, seeking input from the open source community on …
Mozilla is experimenting with improved Private Browsing
Mozilla Foundation is again aiming to boost the privacy of Firefox users, and is beginning to test a new, improved kind of Private Browsing.“All major browsers offer …
Redefining security visualization with Hollywood UI design
Most security interfaces today leave a lot to be desired, and many security pros are gaming enthusiasts, accustomed to a sharp and engaging virtual world. ProtectWise CEO …
OpenSSH 7.0 deprecates weak, legacy and unsafe cryptography
OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. Additionally, it provides secure tunneling …
Kali Linux 2.0 released: New 4.0 kernel, improved hardware and wireless driver coverage
Kali Linux, the open source penetration testing platform, has reached version 2.0.Kali Linux 2.0 comes with a 4.0 kernel, now based on Debian Jessie. It features improved …
MatrixSSL Tiny: A TLS software implementation for IoT devices
INSIDE Secure announced the availability of MatrixSSL Tiny, the world’s smallest Transport Layer Security (TLS) software implementation, to allow companies to affordably …
What’s the state of your software?
Cybercrime is felt by businesses up and down the country, with the Information Security Breaches Survey (ISBS) reporting that 81 per cent of large and 60 per cent of small …
List of approved Windows 10 compatible security products
Windows 10 is now available to users around the world, and it comes with new security features.AV-Comparatives tested a variety of software titles to see which of them are …
Over 5,000 mobile apps found performing in-app ad fraud
Of the $20 billion projected to be spent by advertisers on mobile advertising in 2015, $1 billion will effectively be lost due to in-app ad fraud, warns ad fraud detection and …
Featured news
Resources
Don't miss
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted
- Identifying high-risk APIs across thousands of code repositories