vulnerabilities

Mac’s Zoom Client Camera Bug Discovered, Patch Required

Since webcams came into existence the product came with a huge “if”. The possibility of some other people accesses the webcam online when they least expect it. Webcams exploded in popularity in the late ‘90s, primarily for use in conjunction with early instant messaging services such as Yahoo and ICQ. Today, webcams are highly integrated

[ Read More ]

The Forgotten IT Security Aspects Of Healthcare Firms

The Healthcare sector’s continued problem with cybersecurity vulnerabilities will continue for many years to come. As long as their equipment follows the principle of “use it until it physically breaks down.” In the world of IT, such a process does not work from the standpoint of security and privacy, especially in the aspect of the

[ Read More ]

Vulnerability Management In The Nutshell

In the process of developing and actually using particular software, security vulnerabilities leading to cyber attacks are commonplace. It is a well-known fact that there are a series of cyber-attacks that are perpetuated by malicious people, we report various incidents of cyber attacks and online misbehavior of some parties, to gain an upper hand in

[ Read More ]

26-Exploits Loaded To Echobot Botnet, A Big Threat

The computing public is being made aware of an emerging botnet that is currently growing in the wild named Echobot. Considered by Palo Alto Network as the spiritual successor of Mirai botnet, Echobot now comes with an arsenal of 26 exploits designed to take over Internet-connected devices, now including a module to infect IoT and

[ Read More ]

Chinese Buckeye Group Behind Two Zero-Day Attacks?

Buckeye group, the alleged hacking team composed of Chinese nationals were implicated by Symantec as the one behind the massive exploitation of a zero-day Windows critical security vulnerability which was only patched by Redmond last March 2019. In fact, Symantec claims that this alleged Chinese hacking team got a hold of the same Equation Group

[ Read More ]

jQuery JavaScript Library, Target Of Pollution Attacks

We can safely say that the Internet and the World Wide Web today will not be possible without the use of a scripting language that most people often overlook, Javascript. Whether we like it or not, JavaScript made the web as interactive, usable and convenient to use, in fact disabling scripting will break the functionality

[ Read More ]

VPN Apps Not Working As Intended, Exposed

As an IT professional for decades, we are always highlighting the importance of VPN when it comes to maintaining security and privacy. It is the most cost-effective way to isolate a connection from prying eyes, a VPN creates a secure virtual pipe from the user’s origin device to the VPN vendor’s exit node, wherever it

[ Read More ]

Legacy Systems And Cybersecurity, A Difficult Reality

Maintenance and continued use of legacy systems by many corporate entities today make the goal of cybersecurity for the world today a tall order. As organizations are transitioning to new systems, the old systems remain running in order to maintain their clients under their current business model. Of course, the reliability of the old system

[ Read More ]

Design Website Houzz Caught In Data Breach

Home improvement and design website Houzz has publicly disclosed that an unauthorized third party had obtained a file containing user data. This looks like the data breach was discovered late last year. According to a report in scmagazine, the FAQ page published on Houzz.com today says that the compromised information falls under three categories: •

[ Read More ]

The Importance of Security in Mergers & Acquisitions

Mergers and Acquisitions- big things happening in the world of business. M&As have yielded wonderful results and have even resulted in the genesis of some of the most successful of business firms. Well, let’s look at another aspect of the M&A process. Typically seen as a mere boardroom thing, there are other aspects of M&A

[ Read More ]