A zero-day vulnerability has been discovered and reported in the Microsoft's Windows operating system that, under a certain scenario, could allow a remote attacker to execute arbitrary code on Windows machine.
Discovered by security researcher John Page (@hyp3rlinx), the vulnerability was reported to the Microsoft security team through Trend Micro's Zero Day Initiative (ZDI) Program over 6
Posted in cyber security, hacking news, vCard exploit, Vulnerability, windows hacking, windows security, windows Vulnerability, Zero-Day Vulnerability | Comments (0)
Another security vulnerability has been reported in Facebook that could have allowed attackers to obtain certain personal information about users and their friends, potentially putting the privacy of users of the world's most popular social network at risk.
Discovered by cybersecurity researchers from Imperva, the vulnerability resides in the way Facebook search feature displays results for
Posted in bug bounty, cyber security, data breach, data security, Facebook, Facebook account security, Facebook hacking tool, facebook vulnerability, hack facebook account, Vulnerability | Comments (0)
In 1999, Bruce Schneier wrote, "Complexity is the worst enemy of security." That was 19 years ago (!) and since then, cyber security has only become more complex.
Today, controls dramatically outnumber staff available to support them. The Bank of America has a $400-million cyber budget to hire security staff and implement a broad array of products.
But what if your budget and
Posted in cyber security, cyber security policy, cyber security software, cyber security tools, cybersecurity, cybersecurity framework, Cynet, incident response tool, network security auditor, network security tool | Comments (0)
Our partner Springboard, which provides online courses to help you advance your cybersecurity career with personalized mentorship from industry experts, recently researched current cybersecurity salaries and future earning potential in order to trace a path to how much money you can make.
Here's what they found were the most important factors for making sure you earn as much as possible:
Posted in cyber security, cyber security career, Cyber Security Certifications, cyber security degree, cyber security jobs salary, cyber security training, cybersecurity, cybersecurity jobs, cybersecurity salary | Comments (0)
Security researchers have discovered a serious code execution vulnerability in the LIVE555 streaming media library—which is being used by popular media players, along with a number of embedded devices capable of streaming media.
LIVE555 streaming media, developed and maintained by Live Networks, is a set of C++ libraries companies and application developers use to stream multimedia over open
Posted in cyber security, live streaming, media player, VLC media player, Vulnerability | Comments (0)
An Irish national who helped run the now-defunct dark web marketplace Silk Road pleaded guilty on Friday to drug trafficking charges that carry a maximum sentence of 20 years in prison.
Gary Davis, also known as Libertas, was one of the site administrators and forum moderators for Silk Road, then-largest underground marketplace on the Internet used by thousands of users to sell and buy drugs
Posted in cyber security, FBI, gary davis, hacker arrested, Ross William Ulbricht, Silk Road, Underground hacking | Comments (0)