Vulnerability

ex-NSA Hacker Detects macOS High Sierra Zero-Day Vulnerability
Vulnerability

How An Ex-Hacker From The NSA Dominated Def Con Conference

A security researcher has demonstrated, at the recent Def Con security conference, that a Mac computer running Apple’s High Sierra operating system can be very easily hacked by simply tweaking…

Read More
Microsoft Cortana Vulnerability Allows Unauthorized Browsing on Locked Devices
Vulnerability

Microsoft Vulnerability Allows Unauthorized Browsing

Researchers have detected a privilege escalation vulnerability with Cortana that allows hackers to gain physical access and do unauthorized browsing on your locked system.  Researchers working at security firm McAfee…

Read More
5 Things to Know For a Successful Pen Testing
Vulnerability

5 Things to Know For a Successful Pen Testing

Penetration testing (AKA Pen test) is an authorized deliberate hacking of a corporate network and computer infrastructure to determine its vulnerability. The vulnerability report arising from pen test is a…

Read More
4 Creative Ways to Secure Video Surveillance Cameras from known Vulnerability
Vulnerability

4 Creative Ways to Secure Surveillance Cameras from known Vulnerability

Corporate systems are categorized into two: Internally developed Developed by a vendor Internally developed systems are the exact tailor fit solutions that meet the requirement of the organization. It is…

Read More
How Businesses Can Prevent Software Vulnerabilities
Vulnerability

How Businesses Can Prevent Software Vulnerabilities

In a new study made by cybersecurity firm Rapid 7, it was revealed that their company’s penetration testers had successfully exploited at least one software vulnerability to 84% of all…

Read More
Why Penetration Testing is Important
Vulnerability

Why Penetration Testing is Important

For enterprises, encountering IT security vulnerabilities have become common incident around their enterprise networks and IT systems. These IT security vulnerabilities can possibly be cause by countless reasons that the…

Read More
New Bluetooth Vulnerability
Vulnerability

Intel Discovers And Publishes New Bluetooth Vulnerability

Turns out, Intel has now discovered and published a new Bluetooth vulnerability, which could help intercept and manipulate transmissions between two compatible devices. The reports say that the newly discovered…

Read More
IoT-Robot-Vacuum-Cleaners-Helps-Hackers-Spy-on-Victims
Vulnerability

These Vacuum Cleaner Vulnerabilities Are The New IoT Nightmare

Cybersecurity researchers have detected a couple of vulnerabilities in an IoT vacuum cleaner lineup that could let hackers spy on the victims, perform video surveillance, and even steal their sensitive…

Read More
UK IT professionals are better at handling security vulnerabilities.
Latest Security News Vulnerability

UK IT professionals are better at handling security vulnerabilities

A survey was conducted by Outpost24 to identify the managing of cyber-security exposure. This survey was conducted at Infosecurity and around 250 plus IT professionals were present for the event….

Read More
Post-GDPR Vulnerability and why Penetration Testing needs to be re-prioritized
Latest Security News Vulnerability

Conquering The Real Challenges Of GDPR Compliance

The General Data Protection Regulation became enforceable on May 25th, 2018, and since then, the risk of a cyber breach has become considerably more concerning for those hosting and processing…

Read More

Page 7 of 11

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register