Browsing tag

Cyber Security

Things That Cybersecurity Experts Should Never Do

Cybersecurity is a very sensitive area, one small mistake and it could lead to grave consequences and big losses. Thus it needs to be pointed out that the cybersecurity professional’s job is a very challenging one. There are lots of manuals prescribing the duties, roles, and responsibilities of a cybersecurity guy. Here’s a look at […]

Cyber Security Threat Hunters? Who Are They? What Do They Do?

The internet has brought with it a lot of benefits for us. Unfortunately, it has also introduced us to cyber crimes. Since the advent of this nefarious activity, the world has been battling hard against it, only to be defeated most of the time. Through experience, we’ve built various security tools, employed various security experts, […]

Cyber Security Skills Program Website Launched by UK Government

As part of the take off for its new cyber security skills program- The HMG Cyber Schools Programme- for teenagers, the UK government has launched a new website. This website, hmgcyberschools.com, would definitely serve to accelerate plans for the £20m HMG Cyber Schools Programme. Students, teachers and even industry stakeholders can use the website to […]

Cyber Security Policy: To Impose or Not to Impose?

Educate teenagers about the ill-effects of drugs and chances are they might refrain from doing them. On the other hand, ‘order them’ not to do drugs, and chances are they might become life long addicts. The same principle applies when it comes to framing cyber security policies as well. Considering the ever-evolving IT security threat […]

Cybersecurity after OPM Breach

The data breach at the United States Office of Personnel Management (OPM) in 2015 was a wakeup call for the U.S. Government. It was just what many government officials had predicted and feared—that one day, they would fall victim to a cyber-attack. In the recent times, we have again witnessed some of the biggest breaches […]

Chinese Cyber Security Laws Force Apple to Build Data Center in China

Apple Inc. will soon be storing cloud data of its Chinese customers with a Chinese government-owned company in accordance with the latest cyber security laws of China. The southern province of Guizhou will become the home to Apple’s first Chinese data center which will store the data for its customers of the iCloud service. The […]

Kaspersky Willing to Share Its Source Code with US Govt

Eugene Kaspersky, the CEO of Kaspersky Labs, is ready to share the source code of the software that his company develops – He wants the authorities to audit his company’s security products amid claims that it has deep ties with the Russian government. In an interview with The Associated Press, he stated that he wanted to […]

Top Tips on How to Land a Well-Paid Job in Cyber Security

The cyber security industry is well-thought of with the huge advancement of online technology and web development, and it means there are thousands of jobs available for people just like you that are interested in a well-paid technology-based career. If you’re looking to land a job in the cyber security industry but you’re not sure […]

NHS Cyber Attack Issued By Someone Fluent In Mandarin

A recent cyber-attack that crippled some of the world’s most critical computer networks might have originated in China. The ransomware attack infects a user’s computer via a malicious email—similar to a phishing attack. The attack affected 300,000 computers in 150 countries. A new analysis relating to the cyber attack suggests that it might have come […]

The Ransomware Attack sends Cyber Security stocks soaring

The latest global “ransomware” has disrupted hospitals, factories, and schools. It has given an incentive to the European investors on Monday to buy those stocks that were most likely to benefit from the pickup in the cybersecurity spending. This cyber attack spread its wings across the globe on Friday. In no time, it locked more […]

5 Proven Cyber Security Certifications That Will Skyrocket Your Salary

With rising salaries and a massive global demand for qualified professionals, cybersecurity is an incredibly attractive industry to work in. There are thousands of unfilled cyber roles and the situation is getting worse; Symantec now predicts there will be 1.5 million unfilled cybersecurity roles by 2019. The demand has been driven by increasing levels of cybercrime, […]

How to Use a VPN Client to Protect Yourself Online

SoftEther VPN is going to change your life. The majority of the internet thinks incognito mode in the average web browser is the epitome of online protection. The next step up is proxies. Proxies are less work and they can be useful, but they don’t always do the trick. They can also be extremely slow, […]

A Beginner’s Guide to Protecting Yourself Online

Sometimes, all it takes is a trusting soul and a paragraph of information online for a person to gain access to your account. Whether the intent is an innocent catfish or a hacking mastermind, you can never be too safe with your identity. What a lot of people don’t realize is that your identity is […]

Touch Bar in New MacBook Pro ‘Hacked’ by White Hat Hackers

Apple’s idea for bundling in a strip of OLED touchscreen at the top of the keyboard for its new MacBook Pro with Touch Bar was to increase user productivity. Called the Touch Bar, this cool new feature has been touted as the next frontier in computing. However, a couple of hackers have just done something […]

Want a Career in Cybersecurity? Find Out Which Degrees Can Get You There

Demand for cybersecurity professionals is high. This is set to continue growing for the foreseeable future and the salaries on offer are generally on the higher end of the pay scale—both factors which make a career in this field an attractive option. Entry level positions require a relevant bachelor’s degree, but the more specialized and […]

New Ticketbleed Vulnerability Bleeds Like Old Heartbleed.. Literally

Filippo Valsorda, a researcher from Cloudflare, recently discovered a bug in F5’s BIG-IP Networks. The flaw has been dubbed as Ticketbleed, keeping in mind its similarity with another such bug, Heartbleed. How does Ticketbleed work? Ticketbleed is a vulnerability in the BIG-IP SSL networks that allows for SSL sessions to be leaked which are as large as 31 bytes. This happens due to the […]

The “Hackable” Website Of Trump’s “Internet Protector” Uses Outdated Tech

Short Bytes: What if the website of the man appointed to safeguard the US government from cyber threats is hackable itself. It has been known the President-elect Donalds Trump’s cybersecurity advisor’s company runs a website which uses outdated versions of PHP, Joomla CMS, and unsafe Adobe Flash plugin. It doesn’t even enable HTTPS connections. It was recently […]

Geoip Attack Map – Cyber Security Visualization Tool

Geoip Attack Map, is a open source tool that helps cyber security to display network attacks on your organization in real time. The data server follows a syslog file, and parses out source IP, destination IP, source port, and destination port. Protocols are determined via common ports, and the visualizations vary in color based on protocol […]

Akamai Kicks off Brian Krebs from its network after 665 Gbps DDoS attack

A couple of days ago Brian Krebs’ blog suffered the largest DDoS attack in the history of Internet – Now, his website has been offline probably because the Akamai/Prolexic can’t bear the cost of such attacks anymore. The official website of cybercrime journalist Brian Krebs suffered and survived 665 Gbps of distributed denial-of-service (DDoS) attack, […]