Browsing tag

Security

How to Secure a Website by Monitoring DNS Records

What is DNS and How Does It Work A Domain Name System, or DNS, takes a familiar and understandable website name like Hackread.com and turns it into an IP address. Whenever you enter Hackread.com or any other web address, your browser automatically does a DNS Query against a DNS server, which supplies the hostname. Next, […]

Information Security Professional Degeneration

00:35 Ministry of Sound, London, UK – We all know what professional development is; I am going to talk about going to the opposite: professional degeneration. If you ask mid-and-advanced-career information security professionals about their jobs in information security, most of them may not express the kindest sentiments. That might be a gross understatement – […]

How to Protect Your Online Store from Cyber Threats

Owning an online store can be a fabulous and lucrative venture in today’s marketplace. With so many sales and transactions taking place online, it can seem like the very best place for you to set up shop. But, while owning an online store can certainly lead to success, it also opens the door to cyber […]

The Benefits of Using a VPN at Home

To many people, the idea of using a VPN is still in its infancy while some believe that VPNs are for those who often use public Wi-Fi networks. There is no doubt that VPNs can be very useful when browsing the internet via public Wi-Fi. Related: Top 10 VPN Services For 2019 However, the benefits […]

Poor security: 15,000 private webcams exposed to creeps

Your exposed webcams are backdoor for creeps. Every cybersecurity article you’ll find will include some sort of reminder emphasizing the use of strong passwords, good antivirus software and the related usual. However, there is less care taken to ensure the hardware components of our computers are secure. In the wake of this, Avishai Efrat, a […]

How To Keep Your Data Safe When Traveling With A Laptop

When we travel, it’s rare we go without some form of electronic device, whether that be our smartphones, tablets or even laptops. They offer us a chance to connect to the rest of the world from the comfort of a hammock, sun lounger, or even just catching up on work in your hotel room. In […]

Every Ecuadorian has been compromised in massive data breach

Data of Julian Assange, founder of Wikileaks was also found in this breach who lived in the Ecuadorian embassy in London since 2012 till April this year after being granted asylum initially. When companies like Facebook can suffer data breaches, it is a good idea for smaller firms to step up their security game. This […]

PingCastle – Get Active Directory Security

  The risk level regarding Active Directory security has changed. Several vulnerabilities have been made popular with tools like mimikatz or sites likes adsecurity.org. Ping Castle is a tool designed to assess quickly the Active Directory security level with a methodology based on risk assessment and a maturity framework. It does not aim at a […]

Malware called InnfiRAT is creeping into cryptocurrency wallets

Cryptocurrencies have been known to be the cause of fortune for quite a few people. It all started from 2009 and even a couple of years later when some users purchased Bitcoin and ended up hitting jackpots after holding them for long periods. However, more people are known for getting their coins stolen and it […]

‘Eva Richter’ Scam Encrypts Your Files By Posing As A Fake Resume

Opening a job email titled “Bewerbung via Arbeitsagentur – Eva Richter” (Application via Employment Agency – Eva Ritcher) could prove disastrous to you, according to a new report. Bleeping Computer, a website dedicated to reporting on Cybersecurity, confirmed the existence of an “Eva Ritcher” fake resume scam. The scam targets people in Germany by attaching […]

The Joker is haunting Google Play Store with malware

Another day, another Android malware – This time; The Joker malware is here not to creep you out but steal from you. While “The Joker” might be your favorite villain fighting the dark knight, a new malware that goes by the name of it may not entertain you. It has been recently discovered by researcher […]

Simjacker vulnerability lets attackers track your location with an SMS

The Simjacker vulnerability could extend to over 1 billion mobile phone users globally. As time passes, we’re witnessing more exploits building upon the usage of sim cards including the ever-famous sim swapping method. To add to these, just recently, AdaptiveMobile Security had released details of a previously undiscovered exploit dubbing it as SimJacking. How it […]

The Five Incident Response Steps

It is important to remember that implementing incident response steps is a process and not an isolated event. For a truly successful incident response, the team should have a coordinated approach. There are five key steps in responding to incidents to ensure efficiency. <iframe width=”560″ height=”315″ src=”https://www.youtube.com/embed/Euhl7hNquTQ” frameborder=”0″ allow=”accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture” allowfullscreen></iframe> The […]

How Can SEO Help Increase Website Security?

Though many think that SEO (Search Engine Optimization) and security do not go hand in hand, they are a lot closer than many think. Whether this is the effect of website security on an existing SEO campaign or the campaign helping to improve the overall security of the website, there are a number of ways […]

99% Email Attacks Require Human Interaction: Security Researchers

Email-based cyber attacks have become common these days. I am not the only one receiving emails saying that the file in the attachment contains data that I might be interested in knowing. Social engineering has become one of the major tools attackers use to lure targets into opening links or attachments. A report by Proofpoint […]

Wikipedia suffers DDoS attack causing worldwide service disruption

The DDoS attack on Wikipedia is first of its kind. The popular online encyclopedia Wikipedia has suffered a DDoS attack over the weekend that crippled its service preventing millions of users from accessing the platform. On Friday according to Down Detector’s Outage Map, a service that keeps track of online platforms facing connectivity issues, Wikipedia […]

Hackers can break into Android devices by sending a text

Not long ago, we saw the emergence of sim swapping attacks utilizing a loophole in the two-factor authentication process. Now in the latest, researchers from Check Point have discovered vulnerabilities in certain Android-based phones including the likes of Samsung, Huawei, Sony, and LG which allows attackers to access your information. These phone companies collectively happen to […]

7 Tips to Increase Your WordPress Security

Do you have a WordPress website? Here are some quick and easy tips to increase your WordPress security and keep your site safe. Did you know that more than 25% of websites on the internet are powered by WordPress? Whether your WordPress website was created for business or pleasure, keeping its content safe from hackers is crucial […]

This Technique Claims To Make Passwords 14 Million% Tougher To Crack

Tide, an Australia-based non-profit organization has come up with a technique called ‘Splintering’ that claims to make usernames and passwords 14 million percent tougher to crack than the contemporary techniques. The technique involves breaking up encrypted usernames and passwords into tiny pieces and then storing them separately in a decentralized distributed network. The same technique […]

Unsecured database leaks phone numbers of 419 million Facebook users

Another day, another privacy disaster hits Facebook users. To add insult to the already enraged privacy advocates, Facebook has yet again disappointed its user base. It has been revealed that 419 million phone numbers belonging to Facebook users have been exposed due to a breach in an online unsecured database. The database contained 133 million records […]