Category

Industry News
SIM port attack
Port tweeking summary This might not be new as peoples’ testimony regarding this type of attack on mobile phone numbers has been alarming since this will make your digital life worse than ever. CYBER criminals are using a simple trick to steal people’s mobile phone numbers, move them to a different carrier and use the...
Continue Reading
hacking
Businessman/ spy / hacker? It marks the first time that the FBI has issued an arrest warrant for a foreigner charged with an act of cyber espionage via a network attack that has until now been attributed exclusively to state actors like the PLA (Chinese People’s Liberation Army).Su Bin, 51, a Chinese national who also...
Continue Reading
Huawei devices
The US Government’s fraud management efforts appear to have made the world go hysterical as it had ordered Alphabet’s Google to revoke the license of Android and Google proprietary apps from Huawei. In a sudden turn of events the Department of Commerce has given Huawei a temporary general license to maintain its current products.The general...
Continue Reading
WordPress Plugin Vulnerability
Beware of a new, unpatched vulnerability that has been made public and could allow attackers to compromise your online store. To be clear, the reported unpatched vulnerability doesn’t reside in the WordPress core or WooCommerce plugin itself.   The vulnerability exists in a plugin, called WooCommerce Checkout Manager, that extends the functionality of WooCommerce by...
Continue Reading
WI-FI Security
Wireless Fidelity We are all connected with it and used it in on daily basis  using computers, smart phones, iPads, game consoles, even our home appliances and other devices to communicate over high-frequency radio signal or wireless signal, however we have less information on how it originally go about, how secure it is and who...
Continue Reading
Docker Hub Hacked
Docker Hub was just attacked! More than 190K user accounts may have been exposed. Docker Hub discovered the unauthorized access to a single Hub database On Thursday, April 25th, 2019. The accessed data includes usernames, passwords, Github and Bitbucket tokens for Docker auto builds. Dockers confirm that only non-financial user data is affected.   Docker...
Continue Reading
vulnerabilities
Two new zero-day vulnerabilities were found in Bluetooth Low-Energy (BLE) chips, which could uncover numerous endeavor firms from around the globe to remote code execution assaults. The arrangement of vulnerabilities were named as “Bleedingbit“. By abusing the bugs, an aggressor could possibly focus on a helpless framework found 100 to 300 feet away.   BLE...
Continue Reading
Healthcare Data Breach
New detailed information has surfaced about a data rupture primarily involving the Healthcare.gov web portal. The information rupture that was first given an account of October 19 influenced to upwards of 75,000 shoppers.   As a result, starting the week of November 5, the Marketplace was phoning those impacted. Following the call, a letter detailing...
Continue Reading
Data Breach
Nordstorm’s lead store in Seattle endured a break that uncovered a portion of its representatives’ delicate data. Despite the fact that the organization has not uncovered the quantity of representatives influenced by the break, Nordstorm has started informing its workers as a part of a breach warning protocol.   Nordstorm uncovered that it found the...
Continue Reading
Routers Botnet
A recently found botnet has taken control of an eye-popping 100,000 home and little office switches produced by a range of well-known industry manufacturers, for the most part by misusing a basic weakpoint that has stayed unaddressed on tainted gadgets over five years after it became exposed.   Scientists, who detailed the mass contamination before...
Continue Reading
1 2 3 5