Latest Security News

VPN Apps Not Working As Intended, Exposed

As an IT professional for decades, we are always highlighting the importance of VPN when it comes to maintaining security and privacy. It is the most cost-effective way to isolate a connection from prying eyes, a VPN creates a secure virtual pipe from the user’s origin device to the VPN vendor’s exit node, wherever it

[ Read More ]

Hackers Can Use Unused Internet Explorer to Steal Data

This is no less than a shocker…Hackers can now use Internet Explorer to steal your data, that too even if you never use it. A security researcher has detected a zero-day vulnerability in Internet Explorer which would allow hackers to steal data. Security researcher John Page has published details and proof-of-concept code for the zero-day

[ Read More ]

Apache Critical Vulnerability Discovered, Update Available For Download

Apache, the top web server platform the Internet as a critical vulnerability which is recently patched by Apache Foundation. Everyone that Apache needs to immediately install the patched version of Apache in order to close the vulnerability which is now known as CVE-2019-0211. As per the report affected versions range from 2.4.17 to 2.4.38, the

[ Read More ]

The Corporate Risks Of Allowing Undocumented Devices

Accessibility and commoditization of computing devices brought both advantages and disadvantages for the public. The smart devices became much more affordable, while manufacturers are motivated to release new devices faster than the market can actually afford. Enterprises are very much affected by these dynamics, given that they have allowed BYOD (Bring Your Own Devices) within

[ Read More ]

Hacking Preventive Ways To Keep Gnosticplayers at Bay

Hackergroup Gnosticplayers had done it again, their recent successful campaigns against 8 websites, namely: Strong Kingdoms, petflow, YouNow, Houzz, Roll20, ixigo, and Ge.tt. These attacks created a huge supply of user credentials that are now available for sale in the Dark Web. At a recent estimate, around 126 million accounts are being offered to Dark

[ Read More ]

Penetration Testing Tool Yuki-Chan for Threat Protection

We are recommending for quite a while for companies serious with their IT security to subject itself to a thorough penetration testing. Pen test can be done internally by knowledgeable IT staff, or the company can hire an external pen testing team. Members of pen test teams are passionable when it comes to detecting weaknesses

[ Read More ]

Facebook Blocks 1.2 Million Videos About The NZ’s Mosque Terror Attack

The recent attacks against mosques in Christchurch, New Zealand captures the attention of the world. Copies of the video footage of the actual event were spreading like wildfire in social media. The terrorists themselves launched a live video of the shooting incident that killed at least 50 people from two mosques. According to the New

[ Read More ]

SandCat And FruityArmor Campaigns Took Advantage Of Zero-Day Flow

Critical vulnerability under CVE-2019-0797 has been recently patched by Microsoft in order to lessen the chances of two Advanced Persistent Threat groups, SandCat, and FruityArmor from taking advantage of it. The former zero-day exploit was being exploited by the two groups extensively, with many of their victims unaware of it. This is given since only

[ Read More ]

Microsoft To Roll Back Updates Which Cause Failed Boot

When Windows 10 was first introduced in 2015, the roll-out was not smooth sailing, but instead became a center of controversy for an operating system released by Redmond. It was accused of being an information collection tool for Microsoft, forced obsolescence of older version of Windows since DirectX 12 API is a Windows 10 exclusive

[ Read More ]

Australia VS Huawei Devices Storyline Never Die

The political propaganda against Huawei devices continues in the land down under, as the Australian Foreign Minister Marise Payne has ruled that the ban against Huawei’s 5G devices will continue to be implemented by the federal government. “We have taken the strongest advice from intelligence agencies in this country, the strongest technical advice as to

[ Read More ]