A specially crafted charger could take control of your laptop
The compromised machines could be used to collect user’s information A new feature included in many modern laptops is the option to power them up through the USB port. UnlikeRead More →
Working as a cyber security solutions architect, Alisa focuses on application and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.
The compromised machines could be used to collect user’s information A new feature included in many modern laptops is the option to power them up through the USB port. UnlikeRead More →
Air Force recruiters will seek computer skills for their operations in the coming years The flight suit is too old fashioned; enterprise network security experts from the International Institute of Cyber SecurityRead More →
There are bugs in lots of points of sale that compromise mobile payment systems Several vulnerabilities in the mobile point of sale devices (mPOS) software have been disclosed. These services are usedRead More →
Online scammers seem to be targeting Apple users Enterprise network security experts have discovered a huge phishing campaign aimed at iPhone users. However, this time the campaign is not limitedRead More →
Researchers developed this stealth-attacking software Enterprise network security researchers have worked with artificial intelligence to automatically detect and fight malware attacks, as well as to stop any kind of cyberattack before itRead More →
Vulnerabilities in certain brands of satellite communications terminals to access GPS data could be used to determine the location of military troops Some satellite communication terminals used in military deploymentsRead More →
Researchers have discovered countless zero-day vulnerabilities that can be used to disrupt critical systems Experts in enterprise network security from the International Institute of Cyber Security reported the finding ofRead More →
Cortana can be activated from the lock screen to run arbitrary commands Enterprise network security researchers noticed some security issues regarding Cortana, the Microsoft voice assistant. Last Wednesday they described aRead More →
Patches for the vulnerability are already available Enterprise network security specialists report that a recently discovered vulnerability in the Linux kernel (operating system core) that affects version 4.9 and furtherRead More →
Flaws allows malicious users to modify content Enterprise network security specialists report that the popular instant messaging app WhatsApp has been affected by multiple security vulnerabilities that could allow malicious users toRead More →
Over two million Mexican patients affected Enterprise network security experts from the International Institute of Cyber Security report that a MongoDB database storing health care information of more than 2Read More →
A hacker published the code, allegedly belonging to the Snapchat app for iOS Enterprise network security specialists from the International Institute of Cyber Security report that the source code ofRead More →
Factories crippled after WannaCry variant infected Windows 7 devices without protection Enterprise network security specialists from the International Institute of Cyber Security reported that Taiwan Semiconductor Manufacturing Co. (TSMC), theRead More →
This new policy involves smartphones, tablets, fitness trackers and any other device or app whit GPS features The Department of Defense has recently launched an order banning all personnel fromRead More →
The OpenEMR system is used around the world Enterprise network security specialists from the International Institute of Cyber Security stated that health records of nearly 100 million patients worldwide wereRead More →
Personal data collected for almost six months were revealed Enterprise network security experts from the International Institute of Cyber Security report that a configuration error on the TCM Bank websiteRead More →
It is recommended to install the released security patches as soon as possible Drupal, the popular open source content management system, has launched a new version of its software toRead More →
WPA/WPA2 protocols are potentially affected by the new hack Enterprise network security researchers have recently discovered a new attack on WiFi (WPA/WPA2) protected access protocols, security standards aimed to make wirelessRead More →
Enterprise network security experts report that a failure in the software of an American bank caused 625 customers to not receiving loan assistance from the Government they were entitled to,Read More →
The company has launched patches for two serious bugs that affect over 160 models of multifunctional printers A few days after publishing their vulnerability bounty program that offers up toRead More →