Archive for the ‘cybersecurity’ Category

Why you need to know about Penetration Testing and Compliance Audits?

November 15th, 2018
We live in an age where data flows like water, becoming the new life source of our everyday ventures. As such, you can just imagine what all of that entails and the weight that data receive, especially when it comes to a decision making on how to handle this fairly new and arguably invaluable resource. Of course, we are well aware from a very young age that our water needs to be pure, filtered

Posted in Compliance Audit, Compliance Audits, cyber security policy, cyber security software, cybersecurity, Penetration Testing, Penetration testing tools, vulnerability assessment | Comments (0)

0-Days Found in iPhone X, Samsung Galaxy S9, Xiaomi Mi6 Phones

November 15th, 2018
At Pwn2Own 2018 mobile hacking competition held in Tokyo on November 13-14, white hat hackers once again demonstrated that even the fully patched smartphones running the latest version of software from popular smartphone manufacturers can be hacked. Three major flagship smartphones—iPhone X, Samsung Galaxy S9, and Xiaomi Mi6—were among the devices that successfully got hacked at the annual

Posted in cybersecurity, hacking competition, hacking news, iPhone X, mobile hacking, Samsung Galaxy S9, smartphone hacking, Vulnerability, Xiaomi Mi 6, Zero-Day Vulnerability | Comments (0)

Cynet Review: Simplify Security with a True Security Platform

November 13th, 2018
In 1999, Bruce Schneier wrote, "Complexity is the worst enemy of security." That was 19 years ago (!) and since then, cyber security has only become more complex. Today, controls dramatically outnumber staff available to support them. The Bank of America has a $400-million cyber budget to hire security staff and implement a broad array of products. But what if your budget and

Posted in cyber security, cyber security policy, cyber security software, cyber security tools, cybersecurity, cybersecurity framework, Cynet, incident response tool, network security auditor, network security tool | Comments (0)

Top 5 Factors That Increase Cyber Security Salary The Most

November 12th, 2018
Our partner Springboard, which provides online courses to help you advance your cybersecurity career with personalized mentorship from industry experts, recently researched current cybersecurity salaries and future earning potential in order to trace a path to how much money you can make. Here's what they found were the most important factors for making sure you earn as much as possible: 1

Posted in cyber security, cyber security career, Cyber Security Certifications, cyber security degree, cyber security jobs salary, cyber security training, cybersecurity, cybersecurity jobs, cybersecurity salary | Comments (0)

Here’s How Hackers Could Have Spied On Your DJI Drone Account

November 8th, 2018
Cybersecurity researchers at Check Point today revealed details of a potential dangerous vulnerability in DJI Drone web app that could have allowed attackers access user accounts and synced sensitive information within it, including flight records, location, live video camera feed, and photos taken during a flight. Thought the vulnerability was discovered and responsibly reported by the

Posted in cybersecurity, DJI Drone, DJI Mavic Pro Drone, DJI Phantom Drone, hacking news, Vulnerability | Comments (0)

New Android API Lets Developers Push Updates Within their Apps

November 8th, 2018
You might have read somewhere online today that Google is granting Android app developers powers to forcefully install app updates…but it is not true. Instead, the tech giant is providing a new feature that will help users to have up-to-date Android apps all the time and yes, it's optional. Along with the launch of a number of new tools and features at its Android Dev Summit 2018, Google has

Posted in Android, Android API, android app developer, android app development, Android app update, Android Update, cybersecurity, In-app updates API, Mobile Security | Comments (0)

Flaws in Popular Self-Encrypting SSDs Let Attackers Decrypt Data

November 6th, 2018
We all have something to hide, something to protect. But if you are also relying on self-encrypting drives for that, then you should read this news carefully. Security researchers have discovered multiple critical vulnerabilities in some of the popular self-encrypting solid state drives (SSD) that could allow an attacker to decrypt disk encryption and recover protected data without knowing

Posted in cybersecurity, disk encryption software, Full Disk Encryption, Hard Drive Data Recovery, hardware encryption, hardware hacking, Self-Encrypting SSD, software encryption, solid state drives, SSD, Vulnerability | Comments (0)

Accused CIA Leaker Faces New Charges of Leaking Information From Prison

November 2nd, 2018
Joshua Adam Schulte, a 30-year-old former CIA computer programmer who was indicted over four months ago for masterminding the largest leak of classified information in the agency's history, has now been issued three new charges. The news comes just hours after Schulte wrote a letter to the federal judge presiding over his case, accusing officials at Manhattan Metropolitan Correctional Center of

Posted in CIA, CIA Hacker, Cyber Crime, cybersecurity, insider threat, Joshua Adam Schulte, Vault 7, Whistleblower, WikiLeaks | Comments (0)

Apple’s New MacBook Disconnects Microphone “Physically” When Lid is Closed

October 31st, 2018
Apple introduces a new privacy feature for all new MacBooks that "at some extent" will prevent hackers and malicious applications from eavesdropping on your conversations. Apple's custom T2 security chip in the latest MacBooks includes a new hardware feature that physically disconnects the MacBook's built-in microphone whenever the user closes the lid, the company revealed yesterday at its event

Posted in Apple MacBook, Apple T2 Security Chip, camera hack, cybersecurity, eavesdropping, Macbook, MacBook Air, macOS security, malware, microphone | Comments (0)