Vulnerability

New Mirai Botnet Variant Now Infects Vulnerable IoT Devices Near You

New Mirai Botnet Variant Now Infects Vulnerable IoT Devices Near You

Right after the smartphone and tablet revolution that disrupted the laptop market considerably, the next big thing is the proliferation of IoT (Internet-of-Things) devices. The days when toasters, refrigerators, home…

Read More
MacOS AirMail 3 App Vulnerable to Email Leaks

MacOS AirMail 3 App, Vulnerable to Email Leaks

Windows-based Outlook Express for a long time had been the center of controversy for Microsoft for implementing an insecure email client from 1993 till 2006. It was only until the…

Read More
Open EDR
Apache Struts Security Flaw May Have Caused Equifax Breach

Security Patch Released In Core Of Apache Struts

Users of the open-source Apache Struts 2 web app development framework have been urged to update their software following today’s disclosure of a critical remote code execution vulnerability that leaves…

Read More
Virtual Patching vs Unpatched Vulnerabilities Unleashed by Trend Micro

Trend Micros Launches Virtual Patching Vs. Unpatched Vulnerabilities

Trend Micro is introducing a new update on how its software implements automatic updates, they dubbed it “Virtual Patching”. It is designed as a short-term stop-gap measure of preventing security…

Read More
Minnesota Man Charged for Employing ‘Hacker for hire’ to Target Local Business Website

How An Ex-Hacker From The NSA Dominated Def Con Conference

A security researcher has demonstrated, at the recent Def Con security conference, that a Mac computer running Apple’s High Sierra operating system can be very easily hacked by simply tweaking…

Read More
Microsoft Cortana Vulnerability Allows Unauthorized Browsing on Locked Devices

Microsoft Vulnerability Allows Unauthorized Browsing

Researchers have detected a privilege escalation vulnerability with Cortana that allows hackers to gain physical access and do unauthorized browsing on your locked system.  Researchers working at security firm McAfee…

Read More
5 Things to Know For a Successful Pen Testing

5 Things to Know For a Successful Pen Testing

Penetration testing (AKA Pen test) is an authorized deliberate hacking of a corporate network and computer infrastructure to determine its vulnerability. The vulnerability report arising from pen test is a…

Read More
4 Creative Ways to Secure Video Surveillance Cameras from known Vulnerability

4 Creative Ways to Secure Surveillance Cameras from known Vulnerability

Corporate systems are categorized into two: Internally developed Developed by a vendor Internally developed systems are the exact tailor fit solutions that meet the requirement of the organization. It is…

Read More
Russian Hackers Reportedly Use Kaspersky Software to Steal U.S Cyber Secrets from NSA

How Businesses Can Prevent Software Vulnerabilities

In a new study made by cybersecurity firm Rapid 7, it was revealed that their company’s penetration testers had successfully exploited at least one software vulnerability to 84% of all…

Read More
Why Penetration Testing is Important

Why Penetration Testing is Important

For enterprises, encountering IT security vulnerabilities have become common incident around their enterprise networks and IT systems. These IT security vulnerabilities can possibly be cause by countless reasons that the…

Read More

Page 8 of 13

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register