IT Security Procedures You Should Not Forget After Electronic Gadget Shopping

What the DJI Vulnerability Tells Us About Live Video Security

At the beginning of November 2018, it was revealed that Chinese drone company DJI had exposed users to a serious vulnerability. The vulnerability, according to a Forbes’ report about the…

Read More
New Project 8

Top 4 Bad Habits Web Developers Need To Forget

Web developers today wide elbow room when it comes to developing their sites, as we enter the age of modern Javascript-engine browsers capable of Web Assembly, WebGL 2.0 and advance…

Read More
Open EDR
Banking Trojan Made in Brazil

Banking Trojan Made in Brazil? A Brief Look

For decades, malware, especially those that can be considered as ‘weaponized’ have been proven developed by state-actors. State-actors are country-hired hackers, with the purpose of developing weaponized software in order…

Read More
Popular Dark Web Hosting Provider Hacked Many Sites Hit

Popular Dark Web Hosting Provider Hacked, Many Sites Hit

Thousands of websites were impacted when Daniel’s Hosting, the prominent Dark Web hosting provider was hacked recently. As per reports, Daniel’s Hosting was hacked this week and taken offline, which…

Read More
Facebook’s New Dilemma Silently Patched

Facebook’s New Dilemma, Silently Patched

Facebook has silently patched a vulnerability very recently that enabled 3rd party sites to extract user information without seeking the consent of individual users first. The aggregate data extraction includes…

Read More
All Yahoo Accounts had been Hacked Not Just 1 Billion 1

Pwn2Own 2018 Tokyo, Japan Edition: $325,000 Reward Money Earned by WhiteHat Hackers

What we can consider as the Olympics-of-White-Hat-Hackers, Pwn2Own hacker competition hosted by TrendMicro in Tokyo, Japan, has given away $325,000 in rewards for the group of hackers for this year’s…

Read More
Used Data Storage Devices Have Security Flaws 1

Used Data Storage Devices Have Security Flaws

According to Researchers at Radboud University in the Netherlands ‘data storage devices with self-encrypting drives don’t provide the expected level of data protection. They say a malicious expert with direct…

Read More
Patient’s life is at risk as pacemakers are vulnerable to cyber attack

DJI Drone Vulnerability Due to DJI Forum’s Weakness, Patched by its Vendor

Just like personal computers, smartphones and tablets, new smart devices such as the highly viral remote quadcopters (AKA drones) are powered by an operating system. As part of the territory,…

Read More
Vulnerability Scanners 101

Vulnerability Scanners 101

Vulnerability scanning is not rocket science; anyone with the time in their hands to search for a software vulnerability scanner can find one in mere seconds. With the way the…

Read More
The Responsible Disclosure of Software Vulnerabilities in the Nutshell

The Responsible Disclosure of Software Vulnerabilities in the Nutshell

Computer security vulnerabilities are a threat that has spawned a booming industry, between the heightened global focus on security, and the proliferation of high-profile computer viruses and worms that have…

Read More

Page 7 of 15

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register