Attacks

Common Ways For Countering Privileged Identity Theft Attacks

Work efficiency cannot be improved without an internal/external network environment these days; successful organizations are all data-driven entities. However, while the Internet comes with convenience, there is a risk of leaking personal information. There are various causes of identity theft, but one is sophisticated of malware such as targeted attack emails. Targeted attack emails are

[ Read More ]

Why The Worst Data Breaches Of 2019 Might Look Like A Nightmare

The year 2018 has seen companies hit with sizable fines and settlements due to data breaches. For example, Uber’s poor handling of its 2016 breach cost the company close to $150 million. And weakly protected, heavily-regulated health data has cost medical facilities big money, resulting in increasingly large fines from the U.S. Department of Health

[ Read More ]

jQuery JavaScript Library, Target Of Pollution Attacks

We can safely say that the Internet and the World Wide Web today will not be possible without the use of a scripting language that most people often overlook, Javascript. Whether we like it or not, JavaScript made the web as interactive, usable and convenient to use, in fact disabling scripting will break the functionality

[ Read More ]

Triton Hacker Group Attacks Saudi Petrochemical Company Again

FireEye, a mainstream cybersecurity consulting firm has recently exposed that a state-funded malware development group was behind an attempt to blow a Saudi-based Petrochemical facility using malware a second time. Called the “Triton” group, they have developed the eponymous malware, it takes control of machinery in order to overwork itself with the chance of eventual

[ Read More ]

Mimikatz: A Deeper Look At Blackhat And Whitehat Hackers’ Shared Tool

There is a thin line that separates black hat hackers (malicious hackers) and white hat hackers (ethical hackers), both possess skills that can harm networks, systems, and computers if they wish to do so. The good thing is ethical hackers helps lessen the chances that blackhat hackers become successful with their campaigns. They do this

[ Read More ]

Twitter Vulnerability that Allows to Tweet on Other People’s Behalf

After various social network hack, particularly with regards to Facebook, many have started giving careful consideration to the security of the social media account. Along these lines, a British security analyst as of late, figured out a genuine flaw on Twitter. Richard De Vere is an ethical hacker and security researcher, who reported about, the Twitter

[ Read More ]

Should You Really Panic About Your Password Being Hacked?

It’s doubtful you’ve ever heard of “the beast”—but it lives in the computer science department at the University of Nottingham in the U.K. and can crack 40 million computer passwords in just seconds. The short story is this—everyone’s computer passwords are just plain terrible, and we should all be changing them like right now. Long

[ Read More ]

More On The Shocking New Scandals Of Russian Cyber Threat

Considering the close relationship between the U.S. and the U.K, especially when it comes to international relations and the sharing of intelligence, American fears regarding Russia’s meddled in their 2016 elections has likely tainted Britain’s view of Russia as well. It wasn’t just Americans who closely followed that electoral process—people around the world were biting

[ Read More ]