The Feasibility Of Tape Backup Against Ransomware

The Feasibility Of Tape Backup Against Ransomware

As ransomware continues to become complex year-after-year, there is only one weapon to overcome the challenge raised by cybercriminals – backup system. We are in the age of cloud-storage services…

Read More
WordPress Plugin’s Administrator Creation Bug Disclosed 1

WordPress Plugin’s Administrator Creation Bug Disclosed

WordPress and other CMS (Content Management System) are heaven-sent for non-programmers, as they can build and update the contents of their website without knowing any programming languages or scripting techniques….

Read More
Open EDR
Why You Need to be Careful About the BlueKeep Vulnerability 1

Why You Need to be Careful About the BlueKeep Vulnerability

WannaCry, the ransomware that struck in 2017, shook the very foundations of thousands of businesses worldwide. The NotPetya attack that followed also caught many businesses unawares and dealt them a…

Read More
Microsoft Warns WannaCry like Windows Attack 1

Microsoft Warns WannaCry-like Windows Attack

Microsoft warns users of older versions of Windows of installing Windows Update immediately to protect against potential, widespread attacks. The software giant has fixed vulnerabilities in Remote Desktop Services running…

Read More
Vulnerability In Intel Processors Affected Millions of PCs 1

Vulnerability In Intel Processors Affected Millions of PCs

In early 2018, Intel and AMD processor researchers discovered two important security holes, Spectrum, and Meltdown. Although damage measures have since been released by Intel, AMD, Microsoft, and other major…

Read More
Twitter Bug Carelessly shared location data of some iOS users 1

Twitter Bug Carelessly Shared Location Data of Some iOS Users

According to Twitter, a bug that revealed the user’s location information, and shared it with an unnamed Twitter partner has been fixed. “We have discovered that we inadvertently collect and…

Read More
Three High Severity PrinterLogic Flaws Detected 1

Three High-Severity PrinterLogic Flaws Detected

Three high-severity PrinterLogic flaws that have recently been detected could help hackers launch remote code execution attacks on printers. Threatpost editor Lindsey O’Donnell reports, “A slew of high-severity flaws have…

Read More
D Link IP Camera’s Unencrypted Cloud Infra Vulnerable to MiTM Attacks 1

D-Link IP Camera’s Unencrypted Cloud Infra, Vulnerable to MiTM Attacks

Cloud cameras (AKA IP Cameras) provide convenient and easy to use visual monitoring device for offices, houses, and shops of all sizes. It is slowly but surely replacing the bulky…

Read More
Cisco Issues 41 Security Advisories in a Single Day 2

Cisco Issues 41 Security Advisories in a Single Day

Cisco has issued 41 security advisories in one day, which is reportedly the highest one-day disclosure in at least 12 months. On Wednesday, May 1, 2019, the San Jose-based company…

Read More
Malformed .MHT File in Internet Explorer May Lead To File Theft 1

Malformed .MHT File in Internet Explorer May Lead To File Theft

As Microsoft is gearing up with a new version of Microsoft Edge based-on Chromium engine, Internet Explorer, its ugly step-mother remains as part of Windows 10, and it is dragging…

Read More

Page 3 of 15

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register