software
Freeware tool helps monitor privileged accounts
Netwrix Effective Permissions Reporting Tool is a freeware solution designed to monitor privileged accounts by reporting on effective permissions in Active Directory and file …
Critical Samba flaw allows unauthorized remote code execution
Samba, the popular free software that allows file and print sharing between computers running Windows and those running Unix or Linux, has been found sporting a critical flaw …
Google ups efforts to protect users against unwanted software
Google is looking to minimize its users’ exposure to potentially unwanted software, and to that end they have announced a few changes. For one, Chrome users will now see …
Mobile apps left vulnerable for months
McAfee Labs researchers found that mobile app providers have been slow to address the most basic SSL vulnerabilities: improper digital certificate chain validation. In …
Google’s new Cloud Security Scanner detects common security bugs
Here’s some good news for Google App Engine developers: Google has released a new application security scanner that’s especially fitting to test new app builds for …
Lepide Exchange Recovery Manager 15.0 released
Lepide Software released version 15.0 of Lepide Exchange Recovery Manager. The latest version allows users to add Office 365 as Source directly in Lepide Exchange Recovery …
GnuPG 2.0.27 released
GnuPG is a complete and free implementation of the OpenPGP standard. It allows to encrypt and sign your data and communication, features a versatile key management system as …
Scammers pushing fake AdwCleaner in active scareware campaign
An active scareware campaign pushing a fake version of the popular freeware spyware removal tool AdwCleaner is targeting Windows users and is trying to get them to fork over …
VirusTotal sets up huge AV whitelist to minimize false positives
One of the worst things that can happen to a software developer, and especially if they are a small firm or a single individual, is for their program to be falsely detected as …
A closer look at LepideAuditor Suite
Server systems are the pillars of an organization’s working environment, and they should be up and running at all times, without any interruptions. If a server crashes …
Majority of dating apps are open to hacks
IBM Security found that over 60% of leading Android dating mobile apps they studied are potentially vulnerable to a variety of cyber-attacks that put personal user information …
GPG development will continue as donations pour in
An article by Julia Angwin on ProPublica has become the catalyst for an avalanche of much needed donations for the survival of Gnu Privacy Guard (GPG), a free email encryption …
Featured news
Resources
Don't miss
- How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military