Rootkits are secret computer programs that allow continuous and privileged access to a computer and actively hide its existence. The term rootkit is the combination of the two words “root”…
Read MoreRootkits are secret computer programs that allow continuous and privileged access to a computer and actively hide its existence. The term rootkit is the combination of the two words “root”…
Read MoreSpear-Phishing Even with the number of messaging apps available now, companies still use email. On average, a person receives over a hundred emails a day from bosses and companies. Because…
Read MoreSecurity has been a major concern for everyone recently, especially for companies that use technology as the main component of their service offering. The increasing pressure of consumer expectations is…
Read MoreWhy would you consider using a multi-tenant SaaS? What are its advantages? In the earlier days of the cloud, companies were hesitant in using this new technology. There were a…
Read MoreDefining Data Exfiltration Also referred to as data theft or exportation, data exfiltration is when an unauthorized transfer of data occurs from one device to another. This can be done…
Read MoreLast month, June 9, 2019 we featured here in Hackercombat.com an article providing a quick glimpse of what a Security Operation Center (SOC) is all about. If we can make…
Read MoreAs we discuss more and more stories about vulnerabilities everyday here in Hackercombat.com, we need to empower you – our readers of the basics of vulnerability management. Programs are flawed…
Read MoreEver since email came into existence in the 1990s and the high level of awareness of the risks involved, 94% of the organizations surveyed said that it was still a…
Read MoreThe operator of Seven-Eleven store operators in Japan said Thursday that some 900 customers using their mobile payment services could lose 55 million yen (the US $ 510,000) due to…
Read MoreD-Link has agreed to make some security enhancements that have reorganized the company’s security platform to resolve disputes from the Federal Trade Commission (FTC) because it has misinterpreted the security…
Read More