Category Archives Vulnerabilities

Hacking, when done ethically is not a crime, just like some of the personalities mentioned here who have contributed significantly to cyber security around the globe. White hat hackers use their cyber security skills to break into protected systems and networks to assess and test the cyber security level and bring out the vulnerabilities before a malicious attacker, or black…

There are a lot of public facing websites that the US air force owns, and it is time they check for the vulnerabilities within these websites to make them full proof. This way they can prevent it from being tampered, and can check for all the possible issues or bugs there are in these websites. For this purpose, the US…

“Orange is the new black” is definitely a raging series, and people look forward to the new episodes. While people were waiting for the latest episode of the series to go live, a hacker who goes by the name The DarkOverLord released the upcoming series on the different file sharing networks, even before it went live on Netflix. This is…

The technology is continuously changing, and people are getting more and more used to it. Every now and then, something new is being developed, and new technologies are being launched almost every day. Behind all these things, there is a threat to our security that we people might be ignoring, and have to pay for that. Ransomware: What is this?…

In today’s modern age of internet and the emergence of the Internet of things, the attempts at sneaking into vital data and financial resources are at an all-time high. Same has been the scenario with phishing emails which are delivering ransomware and other malicious files and executable to all kinds of masses. While the organizations have been backing up their…

Malicious Attackers usually rely on their Capabilities, intent and opportunity to be able to carry out an attack on their prey successfully. While the organisations can hardly do anything with the first two attributes, it’s the opportunities on offer that they can leverage their intelligence upon to apply intelligence-driven security across their infrastructure and operations. And with the increasing buzz…

A lot of businesses, owing to security vulnerabilities and other security issues feel the increasing need to hire a cyber-security specialist, who is capable and can help them solve major & minor issues with ease. The industry lacks skilled and knowledgeable people, which have left organizations vulnerable to attacks. The reason for the shortage can be attributed to the lack…

ESET had released a new campaign that was specifically directed towards MacOS, and the increase in Ransomware. The team wanted more Mac users to start using the ESET antivirus to protect their machines and information against virus and security vulnerabilities. It is apparently true that most hackers have a day when they can expose vulnerabilities within the software that aspire…

Anonymous, a group of hacktivists, is known for their social service along the cyber-crime world. They are known to take down the websites that carry out illegal activities and have special footprints in the dark web world. They are specifically against child pornography and have attacked websites that have gone against the principles of human rights or, have violated child…

Close