Tag Archives Vulnerabilities

Hacking, when done ethically is not a crime, just like some of the personalities mentioned here who have contributed significantly to cyber security around the globe. White hat hackers use their cyber security skills to break into protected systems and networks to assess and test the cyber security level and bring out the vulnerabilities before a malicious attacker, or black…

There are a lot of public facing websites that the US air force owns, and it is time they check for the vulnerabilities within these websites to make them full proof. This way they can prevent it from being tampered, and can check for all the possible issues or bugs there are in these websites. For this purpose, the US…

Malicious Attackers usually rely on their Capabilities, intent and opportunity to be able to carry out an attack on their prey successfully. While the organisations can hardly do anything with the first two attributes, it’s the opportunities on offer that they can leverage their intelligence upon to apply intelligence-driven security across their infrastructure and operations. And with the increasing buzz…

A lot of businesses, owing to security vulnerabilities and other security issues feel the increasing need to hire a cyber-security specialist, who is capable and can help them solve major & minor issues with ease. The industry lacks skilled and knowledgeable people, which have left organizations vulnerable to attacks. The reason for the shortage can be attributed to the lack…

ESET had released a new campaign that was specifically directed towards MacOS, and the increase in Ransomware. The team wanted more Mac users to start using the ESET antivirus to protect their machines and information against virus and security vulnerabilities. It is apparently true that most hackers have a day when they can expose vulnerabilities within the software that aspire…

A great number of people are going mobile with the Internet, and the way they use their devices. Growth in a number of WiFi enabled devices, and mobile WiFis has allowed people to access the Internetin public, and this excellent example of Internet of Things is seeing growth.Today, Internet of Things is conducting the way we connect to printers, coffee…

In a report published at the end of February, it was revealed that almost nine popular password managers confirmed security vulnerabilities. With this news comes the big question- will we be able to protect anything in 2017? Can we keep things safe from the hackers? The main purpose behind having password managers is to make sure all your passwords are…

At the moment, everything the Pentagon has involves software. The exponential growth in data has led to increased opportunities for the Department of Defense but, it has also created a lot of challenges. One of the greatest challenges facing Pentagon is managing their systems in the era of cyber-crimes. The data is vulnerable, and the systems can be compromised in…

With every gap pronounced, Whatsapp is releasing updates to close them and ensure a seamless user experience. Currently, WhatsApp is all set to introduce a new feature which will allow you to recall messages that were sent by mistake. As part of this update, Whatsapp will also allow live location tracking to know your contacts’ whereabouts in real-time. Interesting, isn’t…

Ransomware, as the name suggests, is software that gives a free hand to the cyber criminals to extort money against the relevant data and documents stored in the computer. Here, the data and documents are held as hostages, and the malware authors can make you spend huge chunks of money to get the data back. This malicious software has found…

Close