software
A closer look at LepideAuditor for File Server
Organizations host file servers to store critical data to and valuable information about its business, customers, and employees. Access to file servers is authorized only for …

Knowledge base of malware intelligence enables rapid containment
The Lastline Knowledge Base (LLKB) launched at the RSA Conference 2015. The new software module can be combined with the Lastline Breach Detection Platform to give security …

Apple Watch app for managing threat intelligence on-the-go
ThreatStream today announced at RSA Conference 2015 the first iOS threat intelligence app for the Apple Watch. The app, which is also available for the iPhone and iPad, …
DARPA to create software systems that last 100 years
As modern software systems continue inexorably to increase in complexity and capability, users have become accustomed to periodic cycles of updating and upgrading to avoid …
New Tor version fixes issues that can crash hidden services and clients
Two new versions of the Tor anonymity software have been released on Tuesday, with fixes for two security issues that can be exploited to crash hidden services and clients …

Tresorit for Business
In the cloud computing era, companies need to be proactive on secure collaboration and file sharing. Tresorit for Business is a solution that, among other things, helps …
Users care about privacy when they know what info is collected about them
A recent study conducted by Carnegie Mellon and Notre Dame University researchers is calling attention to several interesting things. For one, mobile apps collect too much …
Puush servers compromised to deliver malware disguised as app update
Users of screenshot-grabbing-and-easy-sharing app Puush are in danger of having their passwords stolen by malware that masquerades as the (then) latest update for the app. It …
Crowdsourcing your bug bounty program
In this interview, David Levin, Director of Information Security at Western Union, talks about crowdsourcing their bug bounty program and the lessons learned along the way. …
Researcher finds backdoor opened by Dell’s helper app
A security researcher has discovered a serious bug in Dell System Detect, the software Dell users are urged to use to download the appropriate drivers for their machines. The …
Half of all Android devices vulnerable to installer hijacking attacks
A critical Android vulnerability that has been discovered over a year ago and responsibly disclosed to Google and other Android manufacturers can be exploited by attackers to …
15,435 vulnerabilities across 3,870 applications were recorded in 2014
In 2014, 15,435 vulnerabilities were discovered according to data from Secunia Research. The vulnerabilities are spread across 3,870 applications published by 500 different …
Featured news
Resources
Don't miss
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise
- Signal blocks Microsoft Recall from screenshotting conversations
- The hidden gaps in your asset inventory, and how to close them
- CTM360 report: Ransomware exploits trust more than tech