Open Data Still Thriving Online
Data is all around us and playing an integral role in our day-to-day lives. It has tremendous power for business and expands human knowledge, but not all of us reallyRead More →
Data is all around us and playing an integral role in our day-to-day lives. It has tremendous power for business and expands human knowledge, but not all of us reallyRead More →
In recent years, XSS attack was found in many web applications, including microsoft, facebook, many more. XSS allows attacker to run malicious scripts. XSS (Cross site scripting) happens because ofRead More →
Cybersecurity firm Kaspersky has released its annual report on ransowmare attacks worldwide in 2019. According to the report, based on publicly available statistics, public organizations in at least 174 differentRead More →
Vulnerability testing specialists reported the existence of multiple flaws in the Cisco Data Center Network Manager (DCNM) software authentication mechanism, which runs on Nexus data center switches. This is aRead More →
Like many other online activities, gambling sites using has its risks. SureBet247, a popular sport betting company based in Nigeria was victim of an incident related to the data protectionRead More →
Thousands of ransomware attacks were reported in the US throughout 2019, although this year it has started in a similar way. An information security firm reported an incident in aRead More →
During the holiday season there is usually an increase in the number of cybersecurity incidents, affecting millions of consumers of products and services, as well as hundreds of widely requestedRead More →
The price of smart TVs has been significantly reduced in the most recent months, although this has little to do with offers or large quantities in stock of these devices.Read More →
Thousands of HSBC bank users in Mexico and Latin America report receiving charges of between $2 and $10 on their accounts, a situation that has been repeated on some recentlyRead More →
Multiple celebrities and public figures have been victims of hacking against their social media profiles in recent years. Before finishing 2019, it was the turn of American singer/actress/producer Mariah Carey,Read More →
Cybersecurity threats don’t always come from outside, as they are often caused by employees or people with some access to a company’s networks. This is the case of Richard Liriano,Read More →
Many times when running a scan of any URL to find its vulnerabilities. Pentesters or security researchers tries to find admin page. Landing on any admin page of any websiteRead More →
There are many hackers who uses programming languages for creating malware, ransomware, phishing attacks & many other viruses, which can affect networks or computers. We will tell you top 2019Read More →
In early December, the US Coast Guard issued an information security alert apparently related to a ransomware attack that compromised some major computer systems at several federal maritime facilities. TheRead More →
Good news for the ethical hacking community. The developers of BlackArch Linux have just announced the release of new ISO and OVA images for the specialized operating system for pentestingRead More →
Information security experts at security services firm Coronet have released their annual report on cities with businesses most exposed to hackers; for the second year in a row, Las VegasRead More →
The use of Internet of Things (IoT) devices not only poses a cybersecurity risk that could compromise networks and other Internet-connected devices, as sometimes information collected by developer companies isRead More →
Piracy is the main problem the videogame industry has faced since its beginning. Currently, video game hacker groups take on average a month to release cracked versions of the latestRead More →
Sometimes we think that a high-end smartphone offers better security than its cheaper counterparts, although this is not completely necessary. According to web application security specialists, in collaboration with theRead More →
Video game developers are increasingly investing time and resources in protecting these products, nevertheless, hacker groups always find a way to remove pre-installed security restrictions to release pirate versions afterRead More →