Posts From Seid Yassin

HTTPS is everywhere you look. Most social media sites use it, YouTube uses it, it’s a basic protocol for secure email, and any website that takes a credit card uses it as a bare minimum. And unfortunately, researchers have just

Barclays has announced that its personal banking customers will, starting this week, be able to use voice security technology over passwords. This would help customers avoid the need to answer various questions over the telephone to gain access to their

As over half a million fans descend on Rio for the summer Olympics kicking off on Friday, experienced fraudsters will be eyeing the deluge of international audiences drawn to this major sporting event, warns ACI Worldwide. Brazil has among the

For those that don’t know, the dark web (also known as Tor) is world wide web content that exists on hidden darkness and requires specific software, or authorization in order for users to get access to it. It’s most commonly

Security researcher Kirill Firsov found a data leak in the popular messaging app Telegram. In the OS X version, text that was copied-and-pasted into the app was also written to the file /var/log/system.log, better known as the syslog, creating a

Security researchers have discovered new malware designed to bypass traditional physical and cybersecurity which could be used in an attack to shut down an energy grid. SentinelOne’s Joseph Landry and Udi Shamir explained in a lengthy analysis that despite some

LAGOS, Nigeria (AP) — A Nigerian accused of scamming $60 million from companies around the world through fraudulent emails has been arrested after months of investigation, Interpol and Nigeria’s anti-fraud agency said Monday. One target paid out $15.4 million, according

Windows 10 will not load unsigned kernel mode drivers, starting with version 1607 of the operating system. This is something that had been announced back in 2015, but is only just being implemented. The decision was taken in order to

We’re all familiar with the SMS text message based security codes used as a security feature by huge numbers of websites from social networks to email to online payments. This is the feature that aims to verify your identity after

One of the biggest challenges for hackers who want to get into more secure and isolated networks is physical. If the network is well protected, you might need to be physically close to it to hack it—and standing around with

Popular online messaging service WhatsApp has made all sorts of security news in recent years. One of WhatApp’s early cryptographic SNAFUs involved using non-secret information to construct secret encryption keys, which is a bit like using your pet’s name as

The founder of an “ethical hacking” community in China, Fang Xiaodun, was arrested by Chinese authorities a week ago according to Chinese news outlet Caixinwang. With up to 5,000 members, Wooyun was considered to be China’s largest community of white-hat

Democratic Party officials said Friday they have been targeted by a fresh cyber attack, similar to a breach at the Democratic National Committee that resulted in an embarrassing leak of party emails. The revelation will raise further questions in the

The Locky ransomware has become the No. 1 email-borne threat, overtaking Dridex and making good use of JavaScript attachments to lead an explosion of malicious message volume. According to the latest Proofpoint Quarterly Threat Summary, malicious mails were up 230%

A major cybersecurity skills shortage across key global markets is putting organizations directly at risk of attack, according to new Intel Security research. The security giant teamed up with research institution the Center for Strategic and International Studies (CSIS) to

Security experts have warned travelers to the Rio Olympics and those searching for updates back at the office to exercise extra caution in order to avoid what’s likely to be a barrage of cyber threats. The Summer Games kick off