How to hack with WebEx
A flaw in WebEx allows you to access the complete scheme of a company. Some time ago, Karl Fosaaen, an expert in digital forensics published a very interesting research onRead More →
Data Security News | Infosec Blog | Cyber Security Tutorials
A flaw in WebEx allows you to access the complete scheme of a company. Some time ago, Karl Fosaaen, an expert in digital forensics published a very interesting research onRead More →
This attack reached about 30 organizations in the US, including Apple and Amazon Amazon began to evaluate a startup company called Elemental Technologies, as potential purchase thinking about its expansionRead More →
WiFi 6 includes functions that make it stable in any environment The new WiFi 6, based on the IEEE 802.11ax standard, enables next generation WiFi connectivity. According to specialists in digitalRead More →
What could be worse than a million Facebook accounts hacked? 50 million Facebook accounts hacked The social media giant issued a press release on the morning of last Friday detailing a potentially damaging situation for the billions of people who use Facebook on aRead More →
Vulnerability persists in different Linux distros Multiple Linux distributions (distros), including all current versions of Red Hat Enterprise Linux and CentOS, contain a recently disclosed vulnerability that provides attackers withRead More →
Check your domestic security system quickly and easily Universal Radio Hacker (URH) is a software to investigate unknown wireless protocols. Includes features such as: Easy Signal demodulation Assign tags toRead More →
While attending a cybersecurity conference in Singapore, a Chinese citizen decided to hack his hotel’s WiFi Zheng Dutao, a 23-year-old security engineer from the Chinese internet company Tencent Holdings, wasRead More →
Have you encountered the proxy error message on Netflix? You’re not the only one, but don’t worry, there is a solution. Since Netflix implemented its overseas VPN ban (thus preventing its usersRead More →
The company did not operate with industry’s best practices It is very easy to assume that data management software companies are perfectly capable of managing their own information. However, itRead More →
An extradited Russian man has been accused of hacking banks, brokers and financial companies in the United States Andrei Tyurin has been accused of being part of a gang thatRead More →
If you use this extension for the Chrome browser, it is recommended to uninstall it immediately Ethical hacking experts report that the official Chrome extension for the MEGA cloud storage service wouldRead More →
A group of entrepreneurs hacked the doorbell of their office using services such as Slack, MessageBird and Now Mollie is a technology company dedicated to payment processing; currently serving more thanRead More →
Cyber security organization specialists from the International Institute of Cyber Security reported the launch of the Lynis security tool. In this new release, several major changes have been made in itsRead More →
You may want to think twice before providing an enterprise fax number to a stranger Many companies still provide their fax number in the contact information section on their websites.Read More →
Enterprise network security experts explain that spoofing occurs when someone makes a call and deliberately modifies the information shown to the person who receives the call, thus hiding his/her identity.Read More →
Another Bluetooth attack technique has been disclosed Specialists in enterprise data protection services have found a highly critical vulnerability that affects some Bluetooth implementations that could allow a not authenticated attacker inRead More →
Another sign that the user-controlled software repository should not be fully trusted One of the most popular Linux distros, Arch Linux, has extracted up to three user-controlled repository packages afterRead More →
LTE was supposed to fix security and privacy shortcomings—now it’s broken, too. The Long Term Evolution mobile device standard used by billions of people was designed to fix many ofRead More →
Data breaches are always bad news, and this is peculiarly bad. Gentoo, a popular Linux distribution (or distro), has suffered the hacking of its repository on GitHub. The bad news is thatRead More →
We all know the media and information technologies play an important role in the political events of a country; therefore, it is important to think about their role onRead More →