News

Many software applications are endangered by using buggy components

June 29, 2015  Security Suite

Many software companies use open-source components in their software. Flaws in such 3rd party components make whole applications vulnerable, especially if the companies have bad inventory practices and thus are not aware of known flaws in used components. Once a vulnerability gets into an application through a component dependency, it stays there usually for a very long time, possibly forever. This can be a serious problem when considering Internet-of-Things devices (e.g. smart cars), which uses software developed exactly the same way as other software and which depend on the 3rd party . However, these problems can be solved by using specialized software that allows which components and their versions can be used during developing software.

Back to News Archive

News of the Month

Stagefright - probably the most dangerous threat to smartphones right now

August 25, 2015  Security Suite

Can you imagine a single received MMS could allow hackers to access all your data on your phone? Meet Stagegright, the exploit that is a threat for 950 million smartphones with Android. Vulnerability like this is very dangerous because it does not require any action by the victim - all the hacker needs to compromise your smarthphone is your phone number.

Product Help

Go to our Help section quickly find solutions for issues you may be having with our products.

Full IT Glossary

Look up technical terms in our extensive glossary! Use this as a reference tool and read informative, easy to understand definitions.

Visit IT Glossary

GetMsg("In_the_spotlight")

Spyware Terminator 2015

GetMsg("Effectively_remove_spyware_from_your_PC")

GetMsg("Learn_more")