What is Attack Surface Analysis and Why is it Important?

What is Attack Surface Analysis and Why is it Important?

This article describes a simple and pragmatic way of doing Attack Surface Analysis and managing an application’s Attack Surface. It is targeted to be used…

View More What is Attack Surface Analysis and Why is it Important?
New Adware Found in 200+ Google Play Apps

New Adware Found in 200+ Google Play Apps

A new adware known as BeiTaAD was found embedded in 238 applications in the official Google Play store and have been installed by 440 million…

View More New Adware Found in 200+ Google Play Apps
Forget BlueKeep: Beware the GoldBrute

Forget BlueKeep: Beware the GoldBrute

A botnet has appeared that has attempted to brute-force 1.5 million RDP connections to Windows systems in the last few days — and counting. While…

View More Forget BlueKeep: Beware the GoldBrute
Google Confirms Android Smartphone Security Backdoor

Google Confirms Android Smartphone Security Backdoor

Earlier this year, Forbes reported how a banking Trojan called Triada had been found on a bunch of brand new budget Android smartphones. Google has now confirmed…

View More Google Confirms Android Smartphone Security Backdoor
Sextortion Scammers Pose as Corrupt CIA Agents

Sextortion Scammers Pose as Corrupt CIA Agents

In a new sextortion scam, cyber-criminals are posing as corrupt officials of the CIA and demanding $10,000 from their targets whose names they claim to…

View More Sextortion Scammers Pose as Corrupt CIA Agents
For two hours, a large chunk of European mobile traffic was rerouted through China

For two hours, a large chunk of European mobile traffic was rerouted through China

For more than two hours on Thursday, June 6, a large chunk of European mobile traffic was rerouted through the infrastructure of China Telecom, China’s…

View More For two hours, a large chunk of European mobile traffic was rerouted through China
5 reasons why you should use a password manager

5 reasons why you should use a password manager

This should go without saying. Unfortunately, it does need to repeat over and over. You need to use a password manager. Why? Let me cut…

View More 5 reasons why you should use a password manager
Dark Web Becomes a Haven for Targeted Hits

Dark Web Becomes a Haven for Targeted Hits

Malware on the Dark Web is increasingly being customized to target specific organizations and executives. Malicious services offered on the Dark Web are more like…

View More Dark Web Becomes a Haven for Targeted Hits
6 questions to consider before implementing a disaster recovery plan

6 questions to consider before implementing a disaster recovery plan

DRP’s are about backing up data and recovering from loss as efficiently as possible, but a plan is only as good as its weakest link.…

View More 6 questions to consider before implementing a disaster recovery plan
Report: Facebook to Announce Cryptocurrency Project This Month

Report: Facebook to Announce Cryptocurrency Project This Month

Social media giant Facebook will reportedly announce its cryptocurrency project this month, allowing employees to take part of their salary in the coin, CNBC reports…

View More Report: Facebook to Announce Cryptocurrency Project This Month