40%
10.08.2011
Starting with release 0.1.6 the HTTP sniffer Httpry can parse the IPv6 protocol. A new statistics module is able to report stats on HTTP requests in realtime. Output buffering can be switched ...
In version 0.1.6 Httpry has acquired the ability to analyze IPv6 data.
... HTTP Sniffer Httpry Can Now Parse IPv6
40%
25.05.2012
The Nmap Project has announced the immediate, free availability of the Nmap Security Scanner version 6.0. According to the announcement, this release is the product of almost three years of work, 3 ... Nmap 6.0 Released
40%
08.03.2024
Tails 6.0, based on Debian 12 “Bookworm” and GNOME 43, has been officially released, reports Marius Nestor.
The latest version of this security-focused Linux distribution includes many new features ... Tails 6.0 Released
39%
23.05.2017
Google is putting its machine learning prowess to work by using it to identify and weed out malicious apps from the Google Play Store.
Google has built Play Protect into every Android device ...
Google is adding a new service called Play Protect to all Android devices.
... Google Uses Machine Learning To Protect Android Users
39%
09.11.2016
Although Google is quite active at disclosing vulnerabilities in Microsoft's products, the search engine giant isn’t that proactive in patching critical bugs in its own products. Google released ...
Google has released a supplement patch for its own Nexus and Pixel devices.
... Google Patches and Doesn’t Patch Dirty COW Bug
39%
27.11.2011
An administrator can only gain useful insights from network analysis if they understand the underlying procedures and protocols. The new version of Wireshark, 1.6, formerly known as Ethereal, can ... for recording and to view JPG files directly in Wireshark. Version 1.6 of Wireshark (which prompted me to write this article) was released in July 2011 and offers better support for large files of more than 2GB
39%
09.11.2016
; or create new accounts with full user rights.”
Adobe Flash was also affected by the vulnerability. The vulnerability was discovered by Google researchers and they informed Microsoft and Adobe on October 21 ...
Google gave Microsoft 10 days to patch the security hole
39%
22.03.2022
Researchers at UC Berkeley and Google have announced a method for designing new accelerators using AI techniques. The new method creates architectures by drawing from existing blueprints ...
Berkeley and Google say the method could lead to smaller and more efficient accelerators
39%
21.11.2017
is now reporting that two major AI-powered virtual assistants, Amazon Echo and Google Home, are also affected by BlueBorne.
“These new IoT voice-activated Personal Assistants join the extensive list ...
Both Amazon Echo and Google Home are threatened by the BlueBorne vulnerability.
38%
22.07.2015
Google has announced the Kubernetes container orchestration system has reached the v1.0 milestone. Kubernetes runs within a “Google-style infrastructure stack” to manage and orchestrate a container ...
Google-funded container orchestration tool rolls over to a big number with the promise of more stable APIs
... Google Announces Kubernetes 1.0