Posts From Shah Sheikh

In the United States, the average email address is associated with no fewer than 130 different accounts on the internet. How many accounts do you use on a daily basis? Chances are there are accounts out there you haven’t seen

Renowned researcher Billy Rios, founder of WhiteScope will be presenting at BlackHat 2017 in Las Vegas an IoT exploit that may potentially inflict physical harm to humans. As IoT devices are becoming more popular, the stakes of causing physical harm

Starting with Chrome 61, Google has declared that it will no longer trust the Chinese certificate authority named WoSign therefore any website that is currently using them for certificates need to prepare for a transition. The phase out began with

Organizations are increasingly clustering their skills and capabilities into security operations centers (SOCs). An SOC is a focused facility where security specialists monitor, assess and defend against computer security issues. Introducing virtual reality (VR) and augmented reality (AR) technology into

Satellite phone communications encrypted with the GMR-2 cipher can be decrypted in mere fractions of a second, two Chinese researchers have proved. The GMR-2 is a stream cipher with 64-bit key-length. Currently, the phones of British satellite telecom Inmarsat use

A new vulnerability affecting one of the most popular WordPress plugin “WP Statistics” has been discovered allowing SQL Injection attacks to be potentially used. WP Statistics is a plugin that enables administrators to have information regarding the number of users

According to the latest security updates released by Google for Android devices, a serious bug dubbed as BroadPwn that affected Broadcom Wi-Fi chipsets found in millions of android devices and certain IPhone models. BroadPwn is a critical remote code execution

The original creator of Petya ransomware has released a decryption key allowing all users that were infected by the ransomware to recover their encrypted files without paying any ransom. The key only unlocks files that were encrypted by the original

A new piece of adware dubbed CopyCat has infected 14 million Android devices around the world, according to researchers at security firm Check Point. CopyCat netted its distributors approximately $1.5 million in fake ad revenues in just two months, Check

Millions of Android phones are at risk of being remotely hacked due to a security flaw called Broadpwn. Broadpwn is linked to a flaw in Broadcom WiFi chips and also affects iOS devices. Google has issued out a patch to

Dell customers might be exposed to cyber-attacks as the pre-installed software includes vulnerabilities that could allow hackers to disable security solutions and to escalate privileges. Marcin ‘Icewall’ Noga of Cisco Talos has discovered 3 different vulnerabilities affecting select Dell systems, urging customers

Security researchers have found a critical vulnerability, tracked as CVE-2017-7526, in a Gnu Privacy Guard (aka (GnuPG or GPG) cryptographic library that allowed them cracking RSA-1024 and extract the RSA key to decrypt data. Linux users need to check out

User accounts of Bithumb, one of the world’s largest Bitcoins and Ether cryptocurrencies exchanges, were compromised in recent hack of the organization resulting in loss of more than $1 Million in cryptocurrencies. Bithumb is the fourth largest Bitcoin exchange and

IPTV Piracy

There has never been a better time for TV entertainment, the content for TV is only going to boom. However, despite the success of the media and entertainment industry (M&E), there is the persistent and menacing trouble of online pirates

NESA, The National Electronic Security Authority, is a government body tasked with protecting the UAE’s critical information infrastructure and improving national cyber security. To achieve this, NESA have produced a set of standards and guidance for government entities in critical

Organizations are replacing their Stateful firewalls with Next-Generation firewalls (NGFW) and Next-Generation Intrusion Prevention systems (NGIPS). Most traditional firewalls are nothing more than packet filters that keep track of who initiated the traffic to automatically allow response traffic back to