All Blogs / Technology / Security / Popular


How to: Testing Android Application Security, Part 2

The popularity of Android devices and applications makes it a target for malware and other threats. This post is the second in a short series on Android application security. In the first article we discussed the basic android environment setup and penetration testing. Show More Summary

Severe Swagger vulnerability compromises NodeJS, PHP, Java

Alongside Ruby and similar languages, the severe flaw allows attackers to remotely execute code.

QiCycle: A Foldable Electric Cycle from Xiaomi

This smart cycle is also the perfect on-the-go fitness companion.

Asus ZenFone Max Review: A Lot of Powerbank in a Phone

If you’re looking for a good battery, the Max can easily last for 2 full days. But what about the rest?

Scandal-hit Mitsubishi Motors to Run Maiden Annual Loss of $1.4 Bn

The losses may double due to compensation costs – 100 billion yen to suppliers, 50 billion yen to customers.

Companies, employees not quite ready for cognitive technology wave of robotics, AI, machine learning

Forrester Research said job losses due to robotics should be contained to about 7 percent, but the change management with implementing cognitive technologies is going to be tricky.

Google Ventures invests $20 million to rate enterprise security threats

GV's investment will push forward cybersecurity audits in the cloud and corporate realm.

Over half of world's top domains weak against email spoofing

Misconfigured email servers could prompt spoof emails being 'sent' from legitimate services.

Hey, Congress, Here’s How You Use Periscope

US Rep. Scott Peters, who has been live-streaming the #nobillnobreak sit-in on Periscope, called on his fellow House members to download the app. The post Hey, Congress, Here’s How You Use Periscope appeared first on WIRED.

House Dems Use Twitter to Make Their Gun-Control Sit-In Public

The cameras are off, but Rep. John Lewis and other Democratic members of Congress are publicizing their sit-in on Twitter. The post House Dems Use Twitter to Make Their Gun-Control Sit-In Public appeared first on WIRED.

After Orlando, the Homemade AR-15 Industry Surges

As talk of an AR-15 ban rises after the worst mass shooting in US history, so do the sales of materials and tools to make those deadly guns at home. The post After Orlando, the Homemade AR-15 Industry Surges appeared first on WIRED.

Tor Project teams up with researchers to toughen up Tor browser

The non-profit is going the extra mile to try and prevent the network being compromised again.

Macro Malware Adds Tricks, Uses MaxMind to Avoid Detection

Macro malware continues to evolve and use new tricks to evade detection. This threat is responsible for downloading malicious Trojans such as Dridex and ransomware such as Locky. Recently McAfee Labs has encountered a new variant of macro malware that uses new techniques to avoid executing in an undesirable environment. Show More Summary

A New Hippie Era? A Strawberry Moon Meets the Summer Solstice

The strawberry moon coincides with the summer solstice this year. This occurred last during the Summer of Love,1967.

Zuckerberg Keeps Control of Facebook

The CEO of the social networking giant can vote himself to make decisions.

IBM Patented a Google Glass-Like Eyewear With ‘Night Vision’

In a low-light environment, the projector automatically projects a low-level red light in to each eye.

Apple keeps details of patched AirPort router vulnerability under wraps

The security patch has upgraded AirPort router firmware to stop exploitation in its tracks.

Silent Circle launches virtual security assistant Privacy Meter

The real-time privacy assistant is part of the latest Silent OS update.

Copyright © 2015 Regator, LLC