Stolen NSA Hacking Tools Were Used In The Wild 14 Months Before Shadow Brokers Leak

Stolen NSA Hacking Tools Were Used In The Wild 14 Months Before Shadow Brokers Leak

One of the most significant events in computer security happened in April 2017, when a still-unidentified group calling itself the Shadow Brokers published a trove…

View More Stolen NSA Hacking Tools Were Used In The Wild 14 Months Before Shadow Brokers Leak
Hacker Takes Over 29 IoT Botnets

Hacker Takes Over 29 IoT Botnets

For the past few weeks, a threat actor who goes online by the name of “Subby” has taken over the IoT DDoS botnets of 29…

View More Hacker Takes Over 29 IoT Botnets
These are the most commonly hacked passwords - is one of them yours?

These are the most commonly hacked passwords – is one of them yours?

Hundreds of millions of internet users continue to put themselves at risk of having their accounts hacked by using incredibly simple and commonly used passwords…

View More These are the most commonly hacked passwords – is one of them yours?
Microsoft discloses security breach that impacted some Outlook accounts

Microsoft discloses security breach that impacted some Outlook accounts

On Friday, Microsoft sent out notification emails to some users informing Outlook account owners of a breach the company suffered and which might have also…

View More Microsoft discloses security breach that impacted some Outlook accounts
The Risk of “Credential Stuffing” to the Smart Home

The Risk of “Credential Stuffing” to the Smart Home

As technology advances and the costs of connecting electronic components to the internet decreases, the cost of having a connected “smart home” also decreases. Sensors…

View More The Risk of “Credential Stuffing” to the Smart Home
Half Of Industrial Control System Networks Have Faced Cyber Attacks, Say Security Researchers

Half Of Industrial Control System Networks Have Faced Cyber Attacks, Say Security Researchers

Industrial control systems in manufacturing, energy, chemical and other environments are coming under an increasing number of cyber attacks, as hacking groups of all kinds…

View More Half Of Industrial Control System Networks Have Faced Cyber Attacks, Say Security Researchers
Penetration Testing: Breaking in to Keep Others Out

Penetration Testing: Breaking in to Keep Others Out

Penetration testing is a direct test of an application, a device, a website, an organization, and even the people that work at an organization. It…

View More Penetration Testing: Breaking in to Keep Others Out
%d bloggers like this: