Archive

‘Do I really need to give this website so much about me?’ That’s exactly what I usually think after filling but before submitting a web form online asking for my personal details to continue. I am sure most of you

Gamification — the process of applying game principles to real-life scenarios — is everywhere, from U.S. army recruitment to immersive cybersecurity training. Employee satisfaction and motivation can be fickle. In a job that requires both repetition and razor-sharp focus to pinpoint

Businesses should ensure that they are still securely protected against DDoS attacks, despite the recent growth of other trends such as ransomware. That’s the warning from Arbor Networks, which is urging organisations of all sizes to make sure they stay safe online

Cisco patched three vulnerabilities in three products this week that if exploited, could have resulted in a denial of service, crash, and in some instances, arbitrary and remote code execution. According to security advisories published Wednesday, each of the vulnerabilities

Google, for the second time this month, has removed malicious apps from Google Play that could have laid the groundwork for an attacker to root infected devices. A researcher with Kaspersky Lab on Tuesday described how attackers managed to evade

Brutal Kangaroo, a tool suite developed by the Central Intelligence Agency (CIA) to infiltrate a closed network of computers within an organization without having any direct access to the network. A closed network of computers consists of computers that are

Even after a month of hearing about WannaCry, the malware is still not dead but active in many parts across the globe. Recently, Honda and 55 speed traffic cameras in Australia were the latest victims. As we all know, the

Not many people think about physical hacking, but rather think of software vulnerabilities and malware. Recently, two researchers, Ang Cui, the founder of Red Balloon Security, and research scientist Rick Housley discovered a way of hacking a processor by using

When you travel outside your corporate network with your mobile device, you are much more vulnerable to man-in-the-middle (MitM) attacks. This is how attackers intercept data as it’s being passed from a mobile device to a server. Of course, this

Scammers are increasingly abusing consumer awareness of sites that encrypt data sent over the internet using HTTPS, particularly through a spike in phishing attacks that hope to win the confidence of victims by using the protocol on spoofed sites. “For

A senior malware analyst at Kaspersky Labs, has discovered a weakness in the Jaff ransomware and was able to release a decryptor for all variants that have been released to date. For those who were infected with the Jaff Ransomware

OpenVPN has this week patched four vulnerabilities, including a critical remote code execution bug, a little more than a month after the results of two security audits of the open source VPN software were published. The patches were released after private disclosures

Windows will be removing SMBv1 (Server Message Block version 1) from the upcoming windows 10 (1709) Redstone 3 Update. SMBv1 is one of the ancient networking protocols that allows the operating systems to read and write data to a system

A vulnerability has been detected in several Unix-based operating systems- Linux, OpenBSD, NetBSD, FreeBSD and Solaris- the vulnerability allows for privilege escalation. The vulnerability A stack is a memory region where you can store short-term data. With limited space available

NSA GitHub

  National Security Agency (NSA) has officially joined GitHub and has launched an official GitHub page. GitHub is an online repository where you can share source code for a lot of applications and services. NSA will be sharing 32 different

According to a new report that was released, 77% of global ransomwares were detected to be in four sectors. Retail (15%), healthcare (15%), government (19%) and business & professional services (28%). Moreover, the GTIR (Global Intelligence Threat Report) by NTT