Category Archives Latest Network Security Vulnerabilities

Hacking, when done ethically is not a crime, just like some of the personalities mentioned here who have contributed significantly to cyber security around the globe. White hat hackers use their cyber security skills to break into protected systems and networks to assess and test the cyber security level and bring out the vulnerabilities before a malicious attacker, or black…

There are a lot of public facing websites that the US air force owns, and it is time they check for the vulnerabilities within these websites to make them full proof. This way they can prevent it from being tampered, and can check for all the possible issues or bugs there are in these websites. For this purpose, the US…

“Orange is the new black” is definitely a raging series, and people look forward to the new episodes. While people were waiting for the latest episode of the series to go live, a hacker who goes by the name The DarkOverLord released the upcoming series on the different file sharing networks, even before it went live on Netflix. This is…

On the 28th of April, Wikileaks released details for Scribbles, also known as “Snowden Stopper”. It is alleged to be the whistleblower tracking tool that was devised by the CIA. It could embed the web beacon tags to the confidential documents, thus allowing the government agency to look into foreign spies as well as whistleblowers. What is a web beacon?…

A lot of businesses, owing to security vulnerabilities and other security issues feel the increasing need to hire a cyber-security specialist, who is capable and can help them solve major & minor issues with ease. The industry lacks skilled and knowledgeable people, which have left organizations vulnerable to attacks. The reason for the shortage can be attributed to the lack…

A great number of people are going mobile with the Internet, and the way they use their devices. Growth in a number of WiFi enabled devices, and mobile WiFis has allowed people to access the Internetin public, and this excellent example of Internet of Things is seeing growth.Today, Internet of Things is conducting the way we connect to printers, coffee…

Linux is an open source operating system which has evolved from its previous version Unix. Though other operating systems offer more user friendliness, Linux has some amazing features that make it a more preferred choice for use by hackers. A few of such features are described below: Strong Access and Control: Linux offers strong access and control to its users.…

Many ATMs currently in India are susceptible to data breach and hacking because they run on outdated Microsoft software. There is a high probability that the ATM in your area is running on software, Microsoft stopped supporting and enhancing long back. Astonishingly about 70% ATMs in India run on Windows XP, for which Microsoft stopped offering security updates, patches and…

A cyber-attack last month, disabled thousands computers across several government ministries in Saudi Arabia. A rare cyber weapon was used to destroy and erase data. Malware used to violate the data of Saudi Arabian Oil Co in 2012 was employed again, this time rendering more than 35,000 computers worthless in a matter of minutes. As the abode of almost half…

Close