software
Many Android and iOS apps still vulnerable to FREAK attacks
Your browser may no longer be vulnerable to FREAK attacks, but what about the mobile apps you use? According to FireEye researchers, who have tested the most popular apps both …
When it comes to cloud apps, companies are left in the dark
More than two-thirds (67 per cent) of organizations admit that unauthorized cloud applications are being implemented without IT’s knowledge or involvement, and …
Microsoft releases EMET 5.2
Microsoft has released version 5.2 of its Enhanced Mitigation Experience Toolkit (EMET), a free utility that can detect and block exploitation techniques that are commonly …
Yahoo announces email encryption plugin, password-free logins
Yahoo email users will soon be able to encrypt the emails they send out by simply clicking on a button. In addition to this, users will be able to effectively forget their …
Students create open source, cross-platform memory scanning tool
Mozilla has unveiled the result of a successful project executed by a group of Computer Science students from Argentina: it’s called Masche, and it’s an open …
2,400 unsafe mobile apps found in average large enterprise
The average global enterprise has approximately 2,400 unsafe applications installed in its mobile environment, according to Veracode. Based on an analysis of hundreds of …
Core Infrastructure Initiative kickstarts OpenSSL audit
Cryptography Services, a team of consultants from several security research firms, have announced that they have been tasked with auditing OpenSSL, the popular and widely used …
μTorrent comes bundled with crypto-miner, users are furious
BitTorrent, the company responsible for the development of the BitTorrent peer-to-peer protocol as well as that of μTorrent, a widely used torrent client, has been …
NLPRank: An innovative tool for blocking APT malicious domains
Security researchers working at OpenDNS’ Security Labs have developed NLPRank, a new system that helps detect – quickly and relatively accurately – phishing …
Lepide Software launches LepideMigrator for Exchange
LepideMigrator for Exchange is a one-stop solution that migrates all user mailboxes, public folders and archive mailboxes along with their content and resources from an …
Signal 2.0: Cross-platform encrypted voice and text communication app
Open Whisper Systems has released a new version of Signal, its free, open source iOS app for end-to-end encrypted voice calls. As announced in July last year, when the first …
A threat assessment of 7 million iOS and Android apps
Android malware is growing more pervasive, and iOS devices are also increasingly at risk. FireEye analyzed seven million mobile apps on both Android and iOS platforms from …
Featured news
Resources
Don't miss
- The messy data trails of telehealth are becoming a security nightmare
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way