CybercureME.com
Home Page Banner

CybercureME.com

TELECOM SECURITY
Home Page Banner

TELECOM SECURITY

SCADA SECURITY
Home Page Banner

SCADA SECURITY

Enterprise Security
Home Page Banner

Enterprise Security

Smart contract coding company Parity has issued a security alert, warning of a vulnerability in version 1.5 or later of

Global Unified Threat Management Market Research Report 2016-2020, is structured with comprehensive market analysis and industry expert’s recommendations. Analysts Forecast

IoT Devices at a Risk

Security researchers at Senrio, an IoT focused security firm, have a discovered a stack buffer overflow vulnerability (CVE-2017-9765) in an

A critical vulnerability has been discovered in the Cisco Systems’ WebEx browser extension for Chrome and Firefox, that allows attackers

Finally, by the requests of many, Microsoft has provided a security feature that will be released with the Fall Creators

Millions of Samsung products ranging from TVs, smartphones, and cameras are currently running Tizen OS, a Linux based operating system

Mass Domain Hijacking

More than 750 domain names were hijacked through the internet’s own systems, registrar Gandi has admitted. Late last week, an

Two implementations of the Kerberos authentication protocol received patches this week against a vulnerability dubbed “Orpheus’ Lyre” that allowed a

Banking With a Selfie in Argentina ICBC, the largest bank in the world by asset volume, recently embraced facial recognition

MacOS Malware on Rise

macOS users aren’t as safe as they think they might be—there’s a new strain of malware going around that infects

LeakerLocker, an Android ransomware that does not encrypt files but rather collects data from the android device such as pictures,

When new streaming devices, such as the Amazon Firestick and Apple TV, were first introduced, many were intrigued by the

One of the favourite pieces of software for malicious hackers to target on users’ computers is Adobe Flash Player. Why?

Computer security biz Preempt warned last October that Microsoft NT LAN Manager (NTLM) should be avoided. On Tuesday, it plans

Oracle’s next quarterly Critical Patch Update is slated for July 18, but two vulnerabilities in an older version of the

Recorded Future’s Insikt Group threat intelligence has recently discovered a hacking software being distributed in underground forums for 500 dollars,

The Tuesday patch released by Microsoft recently addressed 19 critical vulnerabilities and 55 other flaws, the former being all related

The university of New Haven has developed what they call AGP (Artifact Genome Project), a database designed to revolutionize the

According to the Global Cyber Security Index survey performed by the United Nations, only 50 percent of the countries either

Adwind RAT

Adwind, a cross-platform Remote Access Trojan, that has the capability of running on any operating system that has been installed

Over the last 10-15 years, many organizations built Security Operations Centers (SOCs) on the backbone of security information and event

In the United States, the average email address is associated with no fewer than 130 different accounts on the internet.

Renowned researcher Billy Rios, founder of WhiteScope will be presenting at BlackHat 2017 in Las Vegas an IoT exploit that

Starting with Chrome 61, Google has declared that it will no longer trust the Chinese certificate authority named WoSign therefore

Organizations are increasingly clustering their skills and capabilities into security operations centers (SOCs). An SOC is a focused facility where

Satellite phone communications encrypted with the GMR-2 cipher can be decrypted in mere fractions of a second, two Chinese researchers

A new vulnerability affecting one of the most popular WordPress plugin “WP Statistics” has been discovered allowing SQL Injection attacks

According to the latest security updates released by Google for Android devices, a serious bug dubbed as BroadPwn that affected

The original creator of Petya ransomware has released a decryption key allowing all users that were infected by the ransomware

A new piece of adware dubbed CopyCat has infected 14 million Android devices around the world, according to researchers at

COMPLIANCE

Why Encryption …? In cryptography, encryption is the process of encoding messages or information in such a way that only

Researchers at ESET analyzed the Dino malware confirming that the sophisticated espionage platform belongs to the arsenal of the Animal

 
 

FEATURED

Smart contract coding company Parity has issued a security alert, warning of a vulnerability in version 1.5 or later of

Global Unified Threat Management Market Research Report 2016-2020, is structured with comprehensive market analysis and industry expert’s recommendations. Analysts Forecast

IoT Devices at a Risk

Security researchers at Senrio, an IoT focused security firm, have a discovered a stack buffer overflow vulnerability (CVE-2017-9765) in an

 


____________________________________________________

Signup for our newsletter and get access to our latest cybersecurity News, Event and jobs.

Email address
Secure and Spam free...