Right after the smartphone and tablet revolution that disrupted the laptop market considerably, the next big thing is the proliferation of IoT (Internet-of-Things) devices. The days when toasters, refrigerators, home…
Read MoreRight after the smartphone and tablet revolution that disrupted the laptop market considerably, the next big thing is the proliferation of IoT (Internet-of-Things) devices. The days when toasters, refrigerators, home…
Read MoreWindows-based Outlook Express for a long time had been the center of controversy for Microsoft for implementing an insecure email client from 1993 till 2006. It was only until the…
Read MoreUsers of the open-source Apache Struts 2 web app development framework have been urged to update their software following today’s disclosure of a critical remote code execution vulnerability that leaves…
Read MoreTrend Micro is introducing a new update on how its software implements automatic updates, they dubbed it “Virtual Patching”. It is designed as a short-term stop-gap measure of preventing security…
Read MoreA security researcher has demonstrated, at the recent Def Con security conference, that a Mac computer running Apple’s High Sierra operating system can be very easily hacked by simply tweaking…
Read MoreResearchers have detected a privilege escalation vulnerability with Cortana that allows hackers to gain physical access and do unauthorized browsing on your locked system. Researchers working at security firm McAfee…
Read MorePenetration testing (AKA Pen test) is an authorized deliberate hacking of a corporate network and computer infrastructure to determine its vulnerability. The vulnerability report arising from pen test is a…
Read MoreCorporate systems are categorized into two: Internally developed Developed by a vendor Internally developed systems are the exact tailor fit solutions that meet the requirement of the organization. It is…
Read MoreIn a new study made by cybersecurity firm Rapid 7, it was revealed that their company’s penetration testers had successfully exploited at least one software vulnerability to 84% of all…
Read MoreFor enterprises, encountering IT security vulnerabilities have become common incident around their enterprise networks and IT systems. These IT security vulnerabilities can possibly be cause by countless reasons that the…
Read More