Latest Security News

Simple Comparison Of Mac vs Windows Hardware

In practice, operability is not so different between Windows 10 and Mac. It may be a big difference from the designers and programmers’ point-of-view, but most of it is just aesthetics. You can change the default setting in the UEFI (Unified Extensible Firmware Interface) page and both operating systems will take note of the hardware

[ Read More ]

Why Google’s Titan Security Keys Is Now Insecure?

We came to a full circle, as the Google who first touted their Titan Security Keys as the secret ingredient why the search giant employees never fell to phishing, is now very much vulnerable to hijacking, at least with its BLE (Bluetooth Low Energy) version. Google was selling their Titan Security Keys, but the search

[ Read More ]

14 Clever Ways To Secure User Login Credentials

The Tech industry has slowly but surely trying to provide the masses a new way to authenticate themselves to web services. New technology as the Windows Hello built-in to all Windows 10 computers with a webcam and SQRL, a QR code-based login system are currently being polished in order to provide users a convenient alternative

[ Read More ]

6 Members Sim Hijacking Team “The Community” Indicted by DOJ

The U.S. Department of Justice has indicted six people allegedly linked with the “The Community” cybercrime group for an alleged SIM card hijacking case which made victims lose an aggregate $2.4 million. The DOJ has posted the announcement in its official Press Release, the six individuals named below are facing multiple cases of aggravated identity

[ Read More ]

How Useful Artificial Intelligence for Operations Will Be?

A huge portion of the typical labor force today will be replaced by artificial intelligence. It is not a question of if, but of when, by that time people needs to see new possibilities to focus on such as creative work, the arts and other aspect of human interest that AI will never able to

[ Read More ]

The Fundamentals of Drones And Its Security

Drone is a common name for UAV: ​​Unmanned Aerial Vehicles, there is also a type of drone on each of the land, sea, and air, which are called UAV, UGV, and UMV, respectively. The current drone for civilian and military use can fly autonomously by GPS and inertial navigation system. What is confusing is that

[ Read More ]

5 Things To Know When Choosing For SaaS

Let us be honest, maintaining software installation library onsite is a very expensive undertaking. There is a cost for acquiring, maintaining, changing and upgrading hardware which hosts the software business need to use for day-to-day operations. Of course, as the lifecycle of software comes to an end, that incurs the cost of upgrading to the

[ Read More ]

Chinese Buckeye Group Behind Two Zero-Day Attacks?

Buckeye group, the alleged hacking team composed of Chinese nationals were implicated by Symantec as the one behind the massive exploitation of a zero-day Windows critical security vulnerability which was only patched by Redmond last March 2019. In fact, Symantec claims that this alleged Chinese hacking team got a hold of the same Equation Group

[ Read More ]

A Quick Glimpse Of Useful Android Q Features

Google I/O has become a very successful yearly conference aimed to unite Android developers and educate enthusiast about the Android operating system and the plans of Google for its development. The 2019 edition of I/O is highly anticipated, especially with the impending release of Android “Q”, which remains to be unnamed at the time of

[ Read More ]

Qbot New Obfuscation Technique Bypasses Antimalware Security

The Cisco Talos team, the cybersecurity research arm of Cisco networks has disclosed the new variant of Qbot (AKA Oakbot), an extensible banking trojan which is infecting vulnerable Windows computers in the wild. With its various ways to trap the user in executing the dropper, either through a malicious email, infected website links and drive-by

[ Read More ]