Top

LATEST PUBLICATIONS



Hacking WiFi Password in a few steps using a new attack on WPA/WPA2

August 8, 2018

A security researcher has devised a new WiFi hacking technique that could be exploited to easily crack WiFi passwords of most modern routers. The security researcher Jens ‘Atom’ Steube, lead developer of the popular password-cracking tool Hashcat, has devised a […]


Incident Response Under GDPR: What to Do Before, During and After a Data Breach

July 30, 2018

The European Union (EU)’s General Data Protection Regulation (GDPR) is in full effect, but many organizations still don’t have the processes in place to be compliant. According to an IBM survey, only 36 percent of executives said they expect to […]


Threats financial organizations will face in 2019

July 12, 2018

What type of threats will financial services and banking organizations face in 2019? According to IntSights Cyber Intelligence, they should be prepared for breaches effected through compromise of established vendor software or SaaS products, and vulnerable third-party, open source software […]


Network security

The Data Security Landscape Is Shifting: Is Your Company Prepared?

August 13, 2018

Via: Dark Reading

New ways to steal your data (and profits) keep cropping up. These best practices can help keep your organization safer. The world around online data is changing, and with it the landscape of business is facing an irreversible shift. Not […]


Vulnerabilities

Apple zero-day exposes macOS to Synthetic Mouse-Click attacks

August 13, 2018

Via: Security Affairs

Patrick Wardle, the popular white hat hacker and chief research officer at Digita Security, has discovered a zero-day vulnerability that could allow attackers to mimic mouse-clicks for kernel access. Wardle presented his discovery during the Def Con 2018 conference in […]


Network security

Dems want GOP chairman to subpoena State Department over cyber docs

August 10, 2018

Via: The Hill

Democrats on the House Oversight and Government Reform Committee are urging its Republican chairman to subpoena the State Department for documents related to former Secretary Rex Tillerson’s move to close an office responsible for advancing U.S. interests in cyberspace. The […]


Phishing

What is phishing? How this cyber attack works and how to prevent it

August 10, 2018

Via: CSO Online

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or […]