Posts From Shah Sheikh

Researchers claim they can hack into internet-connected car wash machines from the other side of the world and potentially turn them into death traps. In a presentation at the Black Hat conference in Las Vegas on Wednesday, Billy Rios, founder

Many workers will feel the need to check-up on work emails while they are away from the office and enjoying a well-earned vacation. Unfortunately, by doing that, they can open organizations to many security risks. T-Systems, the corporate IT and

IOActive researcher Ruben Santamarta has uncovered a number of cybersecurity vulnerabilities in widely deployed Radiation Monitoring Devices (RDMs), and has presented his research at the Black Hat conference in Las Vegas. RDMs are used to monitor the radiation found in

A new wave of Emotet trojan infections is spreading via phishing emails sent from compromised Outlook accounts. At first glance, these appear to be a fairly run-of-the-mill phishing campaigns complete with booby-trapped Word documents disguised as invoices. But on further

The report that was released by Human Factor in IT Security: How Employees are Making Businesses Vulnerable from Within, states that employees in 40 percent of businesses across the world hide cyber incident  from upper management in order to avoid punishment. What

According to the 2017 State of CyberSecurity Metrics Report, global companies and governments spend on cyber security more then a hundred billion dollars while 32 percent of the companies are purchasing security technology blindly. On top of that, the more

CowerSnail

Security researchers at Kaspersky Labs detected a new backdoor malware that allows its creators to execute remote commands on any system and is known as CowerSnail. The backdoor uses the same C&C server as the malware that was used to

FruitFly, a Mac malware that was discovered by Thomas Reed, a Malwarebytes researcher, that can remotely access and control webcams, screen, mouse, keyboards, and install malicious software on the victims Mac computer. The malware was discovered a few months and

Smart City Security

Wherever you turn in the business and technology worlds, the internet of things (IoT) is the hottest of all topics. Whether the conversation is about clothes or medical devices, robots or bicycles, cloud computing or mobile wearables, traveling the world

Google has implemented new protections that should considerably reduce the risk of potentially malicious apps gaining control of users’ Google account. There can be no doubt that the added security is a direct consequence of the massive phishing attack in

Apple has released patches addressing roughly four dozen exploitable security vulnerabilities in iOS, macOS, and WatchOS. The iOS 10.3.3 update resolves 47 flaws for the iPhone, iPad and iPod Touch, including multiple remote code execution holes in the WebKit browser

Every time you pick up a personal computer from a vendor, chances are that it will have an extremely basic firewall pre-installed. These consumer-grade firewalls leave much to be desired, especially in the business environment. You’ll want to make sure

Smart contract coding company Parity has issued a security alert, warning of a vulnerability in version 1.5 or later of its wallet software. So far, 150,000 ethers, worth $30 million, have been reported by the company as stolen, data confirmed

Global Unified Threat Management Market Research Report 2016-2020, is structured with comprehensive market analysis and industry expert’s recommendations. Analysts Forecast Global Unified Threat Management Market to Grow at 14.71% CAGR during the Period 2016-2020. To calculate the market size, the

IoT Devices at a Risk

Security researchers at Senrio, an IoT focused security firm, have a discovered a stack buffer overflow vulnerability (CVE-2017-9765) in an open source third party code library gSOAP- an advanced C/C++ auto-coding tool used for developing XML Web services and XML

A critical vulnerability has been discovered in the Cisco Systems’ WebEx browser extension for Chrome and Firefox, that allows attackers to execute malicious code on the victims’ computer remotely. Cisco WebEx is a communication tool that allows users to connect