Vevo’s channel hacked, YouTube safe and sound
YouTube make it very clear that it didn’t suffer a hack, Vevo did. People began noticing early this morning that music videos from some of the most popular artists inRead More →
Working as a cyber security solutions architect, Alisa focuses on application and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.
YouTube make it very clear that it didn’t suffer a hack, Vevo did. People began noticing early this morning that music videos from some of the most popular artists inRead More →
Most people rely on Outlook email address for work-related as well as personal tasks. Unfortunately, Outlook may not be as secure as we users would like to think. According toRead More →
It’s a common theme of security breach reports that most compromises go unnoticed for several weeks and that organizations had evidence of the breach in their event logs. The information securityRead More →
Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat. This is a brief walk-through tutorial that illustrates how to crack Wi-Fi networks that are secured using weak passwords. It is notRead More →
According to CNBC, Facebook had a secret plan. It wanted to capture data from hospitals about their most vulnerable patients, and match it up with user profiles on the world’sRead More →
Cyber-criminals used compromised websites to distribute malware under the guise of updates to popular applications, including Adobe Flash, Chrome and FireFox. Information security training researchers find out that in several cases, theRead More →
Dubbed as ATMJackpot, the new ATM malware has been identified by information security training researchers at Netskope Threat Research Labs. Initial investigation revealed that the malware originated from Hong Kong while theRead More →
March 25th, 2018, malicious hackers compromised AOL’s advertising platform and modified its script to mine Monero cryptocurrency. The information security training researchers at Trend Mirco also found MSN’s web portal’sRead More →
The perception about Apple devices is that they are protected from attacks by default which is not true. Information security training researchers at Trend Micro have discovered a new malware which theyRead More →
Let’s say that your internet connection suddenly went down or, perhaps, you cannot reach your favorite website. There’s a reason for that; according to our sources, there’s a massive attackRead More →
Using Cloudflare’s 1.1.1.1, other DNS services still requires some command-line know-how. The death of network neutrality and the loosening of regulations on how Internet providers handle customers’ network traffic have raised manyRead More →
Personal data and payment information of Sears and Delta Air Lines customers may have been exposed in a data breach last year. Sears and Delta said they were informed lastRead More →
Facebook CEO Mark Zuckerberg revealed that all of its 2.2 billion users should assume their public data has been compromised by third-party scrapers. The source of this vulnerability is Facebook’sRead More →
In past researches, information security training experts examined internet-connected medical-related devices and systems such as databases, hospital admin consoles, and medical devices. The professionals also looked into the supply chain, which hasRead More →
A Mandarin character in an error message on the inaccessible website of the ministry of defense, and a tweet by the defense minister that hinted at a possible hacking, followedRead More →
Information security training experts from MindPoint Group, an information security firm, have hijacked over 2,000 subdomains from legitimate websites while researching possible vulnerabilities in Amazon’s CloudFront CDN service. Experts foundRead More →
Leastways 1,000 Magento based websites including shops have been targeted and infected with this malware, say the information security training researchers. Threat analysis and cyber-security intelligence firm Flashpoint stated thatRead More →
Intel won’t fix Meltdown nor Spectre for 10 product families covering 230-plus CPUs. Intel has issued new “microcode revision guidance” that reveals it won’t address the Meltdown and Spectre designRead More →
Grindr shared personal, HIV and geolocation-related data with two of its third-party contractors without informing users, information security training researchers said. As a way to make relationships safer, the gayRead More →
WhatsApp cofounder Brian Acton expressed outrage at Facebook’s privacy policies last month by tweeting “It is time. #deletefacebook.” But WhatsApp’s Facebook-like group chat features also have design flaws that jeopardize user privacy. Maybe it’sRead More →