Advertisement
Top

Tag: tool


Cloud security

On-Premise Security Tools Struggle to Survive in the Cloud

April 11, 2018

Via: Dark Reading

Businesses say their current security tools aren’t effective in the cloud but hesitate to adopt cloud-based security systems. Cloud usage is growing faster than businesses’ ability to secure it. While IT pros are quick to point out the benefits of […]


Email security, Phishing

Several White House domains lack anti-phishing tool: research

April 5, 2018

Via: The Hill

More than half of the email domains managed by the White House’s Executive Office of the President (EOP) have not yet implemented an email security tool designed to protect users from phishing attacks, according to new research. The Department of […]


Application security, Cloud security

AWS Launches New Tools for Firewalls, Certificates, Credentials

April 5, 2018

Via: Security Week

Amazon Web Services (AWS) announced on Wednesday the launch of several tools and services designed to help customers manage their firewalls, use private certificates, and safely store credentials. Private Certificate Authority One of the new services is called Private Certificate […]


Mobile security

Best Android antivirus? The top 12 tools

February 27, 2018

Via: CSO Online

The following are the 12 best antivirus tools for Android, according to AV-TEST’s January 2018 evaluations of 20 Android security apps. (The AV-TEST Institute is a Germany-based independent service provider of IT security and antivirus research.) Each Android antivirus software […]


Network security

Researcher to Release Free Attack Obfuscation Tool

February 21, 2018

Via: Dark Reading

Advanced nation-state and cybercrime groups increasingly are hiding behind legitimate Microsoft Windows functions to mask their hacks – and their latest method ups the ante in abuses of the basic command prompt. The FIN7, aka Carbanak, cybercrime gang known for […]


Network security

How to speed up security tool evaluation and deployment

February 5, 2018

Via: CSO Online

With the rise in both the volume and variety of cyber threats, it seems there are now specialized tools for almost everything. This was never more obvious than at the latest RSA Conference, where there were more than 800 exhibitors […]


Privacy protection, Virus & Malware

How Antivirus Software Can be the Perfect Spying Tool

January 10, 2018

Via: Security Week

Your antivirus product could be spying on you without you having a clue. It might be intentional but legitimate behavior, yet (malicious) intent is the one step separating antivirus software from a cyber-espionage tool. A perfect one, experts argue. Because […]


Malware, Virus & Malware

Terdot Banking Trojan Could Act as Cyber-Espionage Tool

November 17, 2017

Via: Security Week

The Terdot banking Trojan packs information-stealing capabilities that could easily turn it into a cyber-espionage tool, Bitdefender says in a new report. Highly customized and sophisticated, Terdot is based on the source code of ZeuS, which leaked online in 2011. […]


Mobile security, Vulnerabilities

Debugging Tool Left on OnePlus Phones, Enables Root Access

November 15, 2017

Via: Threat Post

Chinese phone maker OnePlus is accused of leaving a debugging app on its phones capable of giving adversaries root access to the devices. The application in question is called EngineerMode and is made by Qualcomm. An anonymous researcher who goes […]


Network security

Virtual Reality Could Serve as a Cybersecurity Recruiting Tool

November 7, 2017

Via: Dark Reading

A recent study finds 74% of millennials and post-millennials agree VR use in cybersecurity tools may entice them into an IT security career. Cybersecurity tools that employ immersive technologies such as virtual reality and augmented reality could attract millennials and […]


Malware

Using a Free Online Malware Analysis Sandbox to Dig Into Malicious Code

August 29, 2017

Via: Security Intelligence

The continuous advancement and sophistication of cyberthreats has gradually decreased the sufficiency of traditional gateway and endpoint security solutions for protection against malware. These approaches were sufficient when malware occurred in small numbers and it was easy to differentiate between […]


Vulnerabilities

Google presents the Project Wycheproof to test crypto libraries against known attacks

December 22, 2016

Via: Security Affairs

Google presented the Project Wycheproof, an open source Crypto Library Testing Tool that was launched to allow development teams to discover security vulnerabilities in popular cryptographic software libraries. “Project Wycheproof tests crypto libraries against known attacks. It is developed and maintained by members […]


Access control

Barclays Unveils Voice Authentication for Phone Banking

August 2, 2016

Via: Security Week

Barclays Bank announced on Monday that it will commence rolling out voice security authentication to all customers, replacing the existing password-based method. A Barclays spokesperson told SecurityWeek this will make its “telephone banking service easier to use and more secure […]


Malware

A free tool to check your system for malware

June 9, 2016

Via: Kaspersky Blog

In case you didn’t know, cyber-criminals often take advantage of bugs (exploitable flaws in software) to get inside their victims’ PCs. That’s why every Internet user should install patches and security updates for their systems and software as soon as […]


Cloud security

Mobile Ad Network Abused in DDoS Attack: CloudFlare

September 28, 2015

Via: cloud-security

One of #cloudflare’s customers was recently hit by a distributed denial-of-service (DDoS) attack that appeared to leverage a mobile ad network and malicious JavaScript. JavaScript-based DDoS attacks have been classified as Layer 7 attacks because they rely on apparently legitimate […]


Network security

Open source Sleepy Puppy tool finds XSS bugs in target apps and beyond

September 3, 2015

Via: network-security

Since Monday, security pros can add another XSS-finding tool to their arsenal, as Netflix has open sourced their cross-site scripting payload management framework dubbed “Sleepy Puppy.” Sleepy Puppy is meant to address the biggest problem with identifying omnipresent XSS issues: […]