Tag Archives Latest Network Security Vulnerabilities

Hacking, when done ethically is not a crime, just like some of the personalities mentioned here who have contributed significantly to cyber security around the globe. White hat hackers use their cyber security skills to break into protected systems and networks to assess and test the cyber security level and bring out the vulnerabilities before a malicious attacker, or black…

There are a lot of public facing websites that the US air force owns, and it is time they check for the vulnerabilities within these websites to make them full proof. This way they can prevent it from being tampered, and can check for all the possible issues or bugs there are in these websites. For this purpose, the US…

“Orange is the new black” is definitely a raging series, and people look forward to the new episodes. While people were waiting for the latest episode of the series to go live, a hacker who goes by the name The DarkOverLord released the upcoming series on the different file sharing networks, even before it went live on Netflix. This is…

Though email communication could not be more secure than secure messaging, after reviewing different service provides we provide a list that you may select from: Hushmail.com - This email provider has been there for a long time and been offering decent service and better terms and conditions. However, it has implemented features that allow it to access users accounts in…

When some at Yahoo did Yell out.

When Yahoo stood up to the US Government when it comes to data requests of US citizens, everyone was over awed with the company's privacy policy. Many people shifted from using other email services to yahoo email. However, with the latest revelation that Yahoo allowed the FBI to scan through its users email by providing it with it's spam scanner,…

When the first mobile phones hit the market, there was such a huge euphoria and with every new release of particular brand, that euphoria seems to have dissipated. And yet it is unfathomable for anyone to be without one in this day and age as without one would mean one is technology backward or obsolete. But the real truth of…

Zero Day means precisely that. There is no previous history of a vulnerability or the malware. There is a commercial market for manufacturing Zero Day exploits that hook on to previously unknown vulnerabilities. And according to the FBI, this was how they could break into  a terrorists iPhone when Apple refused to help. Both hackers, black and white ones are…

Yes. This is some fantastic news for those who are concerned about security and privacy. Besides offering VPN access for its native browsers on the mobile, Opera has now introduced a standalone app which when installed on your smartphone channels encrypted and secure communication to all other apps and also app stores. This means you can now feel comfortable in…

When one Bird falls, all the rest fall too! This could not be far from the truth with respect to Linux whose traffic hijack flaw seem to have also affected 1.4 billion android devices as well and these include all those with Android 4.4 KitKat and later. What was supposed to be intention with a noble purpose in protecting the…

Recently a well known security company, BitDefender investigated four popular Internet of Things (IoT) devices. One of which was WiMo, the tech that is used to control lights and wall sockets. BitDefender found that the switch communicates with a smartphone sans any kind of authentication.  And to top it off, the password is the only piece of information that is…

12
Close