What to consider when choosing a password manager
What is the rule of thumb when it comes to password creation? The longer and more complex the password, the more secure it is. What’s more, you must not useRead More →
What is the rule of thumb when it comes to password creation? The longer and more complex the password, the more secure it is. What’s more, you must not useRead More →
Thousands of public organizations and private companies keep using remote work to comply with isolation measures due to coronavirus combat, so demand for cloud services has been increasing during theRead More →
Sometimes we need a proxy to quickly and anonymously access some information online. Here we will tell you 10 of them that you can use for free. First, let’s understandRead More →
Smart cars have become one of the main targets of some cybercriminal gangs. Malware reverse engineering experts from the Cisco Customer Experience Assessment and Penetration Team (CX APT) have revealedRead More →
CVE-ID: CVE-2019-11048 Exploit availability: No Description The vulnerability allows a remote attacker to perform a denial of service (DoS) attack. The vulnerability exists due to the way PHP handles longRead More →
Introduction WhatsApp has become a important part of billions of people life. Many of us woke up or go to bed, by checking our WhatApp messages. Some of us areRead More →
A team of network perimeter security specialists has revealed the finding of at least three vulnerabilities in Emerson’s OpenEnterprise SCADA, a system used in multiple enterprise environments. According to theRead More →
Having a website means a lot of maintenance and all sort of work. But everyone knows that one of the most important things to look at is security. Hackers andRead More →
The developers of Zephyr have taken a nasty surprise. An audit by vulnerability assessment experts from NCC Group has revealed 25 vulnerabilities in this real-time operating system (RTOS) designed forRead More →
As the use of Internet of Things (IoT) devices in home environments grows, so do reports of security and privacy risks. Blake Janes, a computer science student at Florida Tech,Read More →
Introduction Keeping yourself anonymous is sometimes your job requirement or for fun. Hackers always find ways to keep their internet traffic completely anonymous and if a hacker is given optionRead More →
A team of specialists from a malware analysis course has revealed the finding of a critical vulnerability in jQuery, the cross-platform JavaScript library that simplifies the way to interact withRead More →
A team of vulnerability assessment specialists has revealed the finding of a serious security flaw present in most Android versions. Apparently, exploiting this flaw would allow a malware variant toRead More →
Video game developers have been hit by hackers really frequently over the past few weeks, and this time it was Nintendo’s turn. According to IT security services experts, the sourceRead More →
Nearly everyone with an online presence needs to pay attention to web hosting security. It no longer applies to the big businesses alone because cyber threats can happen to anyone.Read More →
A team of computer forensics specialists have reported the finding of two vulnerabilities in FortiClient and FortiGateCloud, of Fortinet Inc. According to the report, exploiting these flaws could lead toRead More →
The Zero Day Initiative malware reverse engineering specialists have released a security alert about a serious privilege escalation vulnerability in Parallels Desktop, the most popular virtual machine software for theRead More →
Phishing attacks are one of the main threats to technology users. Hackers constantly seek to deceive victims by usurping the name of well-known brands, companies or products, deploying massive campaignsRead More →
Specialists in a cyber security course have revealed the discovery of at least three critical security vulnerabilities in FreeRDP, a free Remote Desktop Protocol library. According to the report, successfulRead More →
CVE-ID: CVE-2020-13164 CWE-ID: CWE-400 – Uncontrolled Resource Consumption (‘Resource Exhaustion’) Exploit availability: No Description The vulnerability allows a remote attacker to perform a denial of service (DoS) attack. The vulnerabilityRead More →