Archive for the ‘cyber security’ Category
If you are responsible for the cybersecurity of a medium-sized company, you may assume your organization is too small to be targeted. Well, think again.
While the major headlines tend to focus on large enterprises getting breached – such as Sony, Equifax, or Target the actual reality is that small and mid-sized companies are experiencing similar threats.
According to Verizon’s 2018 Data
Posted in Cyber Attack, cyber security, cyber security videos, cyber security webinar, cybersecurity, Enterprise Security, hacking news, webinar | Comments (0)
A zero-day vulnerability has been discovered and reported in the Microsoft's Windows operating system that, under a certain scenario, could allow a remote attacker to execute arbitrary code on Windows machine.
Discovered by security researcher John Page (@hyp3rlinx), the vulnerability was reported to the Microsoft security team through Trend Micro's Zero Day Initiative (ZDI) Program over 6
Posted in cyber security, hacking news, vCard exploit, Vulnerability, windows hacking, windows security, windows Vulnerability, Zero-Day Vulnerability | Comments (0)
Can feds force you to unlock your iPhone or Android phone?
A Northern California judge has ruled that federal authorities can't force you to unlock your smartphone using your fingerprints or other biometric features such as facial recognition—even with a warrant.
The ruling came in the case of two unspecified suspects allegedly using Facebook Messenger to threaten a man with the
Posted in android lock, cyber security, fingerprint scanner, iPhone Face ID, iPhone hacking, iphone lockscreen, law enforcement, smartphone security, touchid, unlock iphone passcode | Comments (0)
Cybersecurity researcher has discovered online a massive database containing records of more than 202 million Chinese citizens that remained accessible to anyone on the Internet without authentication until last week.
The unprotected 854.8 gigabytes of the database was stored in an instance of MongoDB, a NoSQL high performance and cross-platform document-oriented database, hosted by an
Posted in Chinese, cyber security, database leaked, Database Security, database server, Hosting provider, MongoDB database, secure mongodb, server security | Comments (0)
Almost every activity on the Internet starts with a DNS query, a key function of the Internet that works as an Internet's directory where your device looks up for the server IP addresses after you enter a human-readable web address (e.g., thehackernews.com).
Since DNS queries are sent in clear text over UDP or TCP without encryption, the information can reveal not only what websites an
Posted in CloudFlare, cyber security, dns security, DNS server, dns-over-https, DNS-over-TLS, fast dns service, Google DNS, internet security, network security, privacy tools, Secure dns | Comments (0)
Remember "The Shadow Brokers" and the arrest of a former NSA contractor accused of stealing 50 Terabytes of top secret documents from the intelligence agency?
It turns out that, Kaspersky Lab, which has been banned in US government computers over spying fears, was the one who tipped off the U.S. government and helped the FBI catch NSA contractor Harold T. Martin III, unnamed sources familiar
Posted in cyber security, data theft, Harold Thomas Martin, insider threat, Kaspersky, Kaspersky Antivirus, NSA contractor, nsa hackers, nsa hacking tools, The Shadow Brokers | Comments (0)
German police are seeking your help in gathering information related to a MAC address that could lead to the cell phone device used by a DHL blackmailer who last year parceled out bombs at different addresses in Brandenburg and Berlin.
Between November 2017 and April 2018, someone used German parcel delivery service DHL to sent out several so-called improvised explosive devices (IEDs) in
Posted in cyber security, DHL blackmailer, German government, German Police, hack wifi password, MAC address, open wi-fi network, Parcel Bomb | Comments (0)
It should come as no surprise that cybersecurity is one of the most important and lucrative fields in the world right now, and it’s becoming more important every day—thanks to a growing number of cyber attacks that are targeting everything from individuals and startups to Fortune 500 companies and entire government agencies.
So it should also come as no surprise that demand for talented and
Posted in cyber security, cyber security books, cyber security training, deals of the day, ethical hacking books, hacking news, learn ethical hacking, learn hacking, thn deal | Comments (0)