Heimdal blog, 19 Experts, 50+ Security Tips
Heimdal asked a range of security experts for their essential security tips. 19 experts (including David Harley) offered over 50 tips.
Heimdal asked a range of security experts for their essential security tips. 19 experts (including David Harley) offered over 50 tips.
One thing Microsoft has been very public about is Windows 10’s new strategy of releasing patches to update the operating system at different times for consumer and enterprise versions.
One of London’s tube stations will become more accessible for vision impaired and blind travelers by an amazing new Bluetooth setup. According to a visually impaired researcher who worked on the project, Courteny Nugent, “when we go to stations, we have to wait around for assistance if there’s no assistant—waiting a considerable amount of time. […]
Using VPN is a crime under UAE’s cyber laws – Anyone found using VPN can be charged for going against the country’s rules and regulations. A high-level Dubai Police official has made it clear that use of Virtual Private Networks (VPN) in the United Arab Emirates (UAE) is strictly prohibited under country’s cyber laws. It was UAE’s Telecommunications […]
The controversial cybersecurity legislation Cybersecurity Information Sharing Act (CISA) will be passed by the Senate Intelligence Committee on Thursday, said the panel’s spokeswoman. Information-sharing on cyber threats between private companies and intelligence agencies will be improved through this measure known as the CISA. There were some concerns expressed by the White House and Democrats over […]
It has been found that hackers can now easily abuse any website’s domain name based email addresses through the Google Apps for work. These e-mail addresses can then be used for sending phishing e-mails for an interested company so as to target users. One can register an account with Google Apps for Work if one […]
In the future, everything around us will be managed by data, and those who have data will have power. So, will anonymity be possible (or desirable)?
Apple fans keen to get their hands on the Apple Watch are advised to think before they click, after hackers exploited a wave of enthusiasm around the launch with a phishing scam linked to a fake giveaway.
The Killer USB USB drives are known be humble creatures that help you out by transferring your data. But, what if a USB drive turns evil and fries your computer? Forget USB 3.1 and USB Type-C, the USB I’m going to describe ahead, will burn down your lovely computer if you insert it in the […]
Its been just under three weeks since February 19th, when Lenovo became entangled in a web of controversy over its preinstallation of Superfish’s Visual Search adware on some of its popular consumer laptops during last year’s holiday shopping season.
A number of websites have been put at risk due to a very popular plugin of the WordPress content management platform vulnerability that allows to hackers to attack the websites. Actually, the fault lies in many of the versions of the WordPress Plugin called ‘WordPress SEO by Yoast’ that has over 14 million downloads thus […]
US Consumers looking for a wireless steal can now get encrypted free monthly phone service thanks to FreedomPop, the firm behind the market new entrant “Snowden Phone.” FreedomPop allows Americans to use free cellphone service. In March 2014, Los Angeles start-up FreedomPop benefitted from rising public concerns regarding mass surveillance with its Privacy Phone, which […]
Around 3,000 new security professionals will be added to the United States military’s infosec unit by 2016, according to reports. It says that the move to increase its already overwhelming security workforce comprising of 1,100-personnel has been approved by the government and reportedly 3,000 new hires will be added across multiple disciplines. These include strategic and […]
Phone hacking ruined the lives of celebrities, and – in at least one case – almost drove a victim to suicide.
The online Turkish hacktivist group RedHack has hacked and defaced the official website of Istanbul Police Association in tribute to Berkin Elvan, a 15-year-old teenager who died March 11, 2014 after being in a coma for 269 days due to a head injury caused by a teargas canister during the Gezi protests in Istanbul, Turkey. RedHack gained admin privileges […]
WordPress’s MainWP Child Plugin has vulnerability… and it is very much exploitable. Researchers at Sucuri have identified a vulnerability in the MainWP Child plugin for WordPress, which according to them is potentially exploitable and can allow hackers to fully control any website. Mickael Nadeau, Sucuri’s security and vulnerability researcher, revealed the finding in his blog […]
Even after almost a year, Facebook apparently has failed to fix a bug that lets attackers hijack accounts on sites that leverage Facebook login such as Mashable, Bit.ly, About.me Vimeo, Angel.co and Stumbleupon etc., reveal Sakurity.com’s blog post. Egor Homakov, the author of the post, identified that “this bug abuses triple-CSRFs at once: CSRF on […]
A lawsuit has been filed against NSA (National Security Agency) to preserve the rights of the 500 million Wikipedia users who visit the website on a monthly basis. The reason apparently is the endangered democratic pillar of free exchange of knowledge and ideas. The mass or “upstream” surveillance on American territories by NSA potentially violates […]
Around 80 percent of global merchants including retailers, financial institutions and hospitality firms have failed interim tests which show they are not in compliance with card data security standards.
Google has opened the registration for the 12th Annual Google Code Jam competition for programmers. To register yourself, click on the blue button given at the end of this post. This year there is a new feature known as Distributed Code Jam which will test the skills of participants in solving problems by using a […]
Sesame Enable is the world’s first touch-free smartphone that will allow users (especially disabled) to use without even using their finger. Just imagine the experience; you taking pictures, making a call or playing a game through gestures, that is, the nod of your head. The smartphone has specifically been designed for mobility impaired users. Sesame […]