Category

Cyber Security
identity theft prevention
Over the past few weeks Facebook has been quite active partnering with different app makers for their Facebook platform to incorporate where users can also enjoy it. Profoundly has been moderately gaining fame and somehow trended. The app Profoundly is used to anonymize users who want to ask questions on Facebook. Despite the apps main...
Continue Reading
Phishing Scheme
Baiting Scheme Legitimately looking organization newsletter subscription forms to scam unwary victims from making payment transactions leading to hackers’ personal bank account. Phishing Technique Drawn companies such as Audi, Austrian Airlines, and S-Bahn Berlin to Russian users. Here’s how it is pulled off: Email catch line saying “Money for you” either written in English or...
Continue Reading
ASUS laptops
How secure are we? There’s no such thing as foolproof system at least now a days when all threat actors are looking for means on how to manhandle security loopholes. Gone are the days when secure haven as what we think it is–say our manufactures OEM are no longer excused to all sorts of attack....
Continue Reading
Data breaches
The UK has something of a reputation for its wet climate, and its citizens for constantly talking about the weather. So, it might come as a surprise to find that in the UK the chance of encountering a data breach is higher than that of experiencing a rainy day. A survey by technology services company...
Continue Reading
hacking
A security researcher cautioned Asus two months back that workers were inappropriately distributing passwords in their GitHub stores that could be exploited to get to the organization’s corporate network. One password, found in an employee repo on the code sharing, enabled the researcher to get to an email account used by internal developers and engineers...
Continue Reading
Magento PayPal
Hacker groups and online fraudsters are mishandling a component of Magento online shops to test the validity of stolen debit and credit card numbers. The transactions are executed against Magento stores that support the PayPal Payflow Pro integration. The PayPal Payflow Pro integration is a payment option available on Magento shops that enables an online...
Continue Reading
Social Media
“Weaponization” of Social Media How are we able to confidently say that the Social media is weaponized? From stalking, petty crimes, going up to wars and even elections. Social Media alone is a giant tactical weapon of the new cyber tacticians that seek out advantage from the digital information era. According to New York Times...
Continue Reading
Ransomware
Risks when an operation gets disrupted How much does it affect a business no matter what size whenever its operations get disrupted? Huge sums of money, time, effort, and most of all the data that are involved in the operations of the business.  Consumer confidence? A plunge in the stakeholders confidence? How dangerous? Ransomware in...
Continue Reading
dark web sales
The latest round of leaked data sold by a famous dark web netizen was noticed by The Hacker News, who already made three separate releases in different time intervals of leaked data for sale in a Dark web Marketplace. The discovery? While the dark web monitoring mode is consistent, with the large hidden services and...
Continue Reading
WordPress Vulnerability
What is the issue? Unauthenticated RCE Vulnerability Remote code execution to access one’s device through a vulnerability is not a new thing, however still one of the ways for hackers to take advantage and make use of another site’s resources to execute malicious actions nonetheless. Without authentication a hacker can take control of a wordpress...
Continue Reading
1 2 3 4 5 16