Security News

The FBI Warns Banks About The Rise Of “ATM Cash Out” Attacks

The FBI Warns Banks About The Rise Of “ATM Cash-Out” Attacks

The U.S. Federal Bureau of Investigation (FBI ) has warned banks about the likelihood of cybercriminals carrying out a global fraud scheme known only as the “ATM Cash-out.” It employs…

Read More
Skype Gives Communication Security a Boost with End to End Encryption 1

Thanks, Skype, For Boosting Security With End-To-End Encryption

The new Skype 8.0 has been fully redesigned and will replace its predecessor, version 7.0, which will cease to function after September 1, 2018. The new version comes with several…

Read More
Open EDR
Minnesota Man Charged for Employing ‘Hacker for hire’ to Target Local Business Website

How An Ex-Hacker From The NSA Dominated Def Con Conference

A security researcher has demonstrated, at the recent Def Con security conference, that a Mac computer running Apple’s High Sierra operating system can be very easily hacked by simply tweaking…

Read More
The Business World Needs A Cybersecurity Defense Strategy

The Business World Needs A Cybersecurity Defense Strategy

Tenable, a cyber exposure firm, has recently released their Cyber Defender Strategies report with unexpected results. Of the 2,100 organizations assessed in the study, only 5% has consistently practice persistent…

Read More
Apple released patches to address vulnerabilities in the High Sierra 1

Why Mozilla Banned 23 Firefox Add-Ons For Mining User Data 

The ban hammer is working tirelessly in Mozilla Land, as the non-profit Developer has recently deleted twenty-three Firefox add-ons from their https://addons.mozilla.org/en-US/firefox/ site that Mozilla detected for harvesting data from…

Read More
Microsoft Cortana Vulnerability Allows Unauthorized Browsing on Locked Devices

Microsoft Vulnerability Allows Unauthorized Browsing

Researchers have detected a privilege escalation vulnerability with Cortana that allows hackers to gain physical access and do unauthorized browsing on your locked system.  Researchers working at security firm McAfee…

Read More
Optus Email Scam Target Customers with Fake Late Payment Penalties

Optus Email Scam Target Customers with Fake Late Payment Penalties

Phishing emails are an everyday occurrence, as they are effective in taking advantage of people’s easy propensity to trust corporate logo-bearing messages.  The number one motivation is profitability, there is…

Read More
Iran purported to Cyberattacks according to reports

Iran purported to Cyberattacks according to reports

As reported in Eurasiareview – A US-based cybersecurity intelligence group says Iranian state institutions have perpetrated a growing number of international cyber-attacks for profit in recent months. In a VOA…

Read More
Cyber security should be a Proactive affair

Cyber security should be a Proactive affair

A few organizations depend on a responsive way to deal with cybersecurity. This method is not advised, and why it is like that, here’s the reason. In detailing a cybersecurity…

Read More
5 Things to Know For a Successful Pen Testing

5 Things to Know For a Successful Pen Testing

Penetration testing (AKA Pen test) is an authorized deliberate hacking of a corporate network and computer infrastructure to determine its vulnerability. The vulnerability report arising from pen test is a…

Read More

Page 53 of 87

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register