A false sense of security.
Last time we spoke about blockchain. It is true that cryptocurrencies can feel secure because they decentralize and often anonymize digital transactions.
Let’s see what we can do to guard our selves against a swath of common attacks. Continue reading “Keeping your cryptocurrencies safe and secure.”
A little backstory
Back in 2014 HTTPS became a hot-topic after the Heartbleed bug became public. This bug allowed people with ill intent to listen in on traffic being transferred over SSL/TLS. It also gave them the ability to hijack and/or read the data. Luckily, this bug got patched quickly after its discovery. This incident was a wake-up call that properly encrypting user information over the internet is a necessity and shouldn’t be an optional thing.
Continue reading “HTTPS – Panacea to Websites Perfomance? Last Part”
Yahoo recently informed that crucial information from at least 500 million Yahoo accounts was stolen from the company. Continue reading “500 million Yahoo accounts breached in 2014”
The UK government has announced an initiative that will see it join forces with some of the country’s hottest start-ups to develop technologies that will help protect the UK from cyber attacks.
Continue reading “UK’s cybersecurity start-up accelerator program”
Responsibility for securing enterprise applications has been moving down the development lifecycle, and for good reason. It not only makes the enterprise more secure but also saves companies time and money.
Continue reading “Protect your code – protect your data”
NETMYSOFT Chief Technical Officer (CTO) Laxman Muthiyah spotted a vulnerability on Facebook’s Rights Manager platform. This vulnerability allows Freebooting that means the act of downloading someone else’s pirated content and uploading it another online platform.
Continue reading “‘Freebooting’ vulnerability in Facebook tool”
According to the hackernews, a new way to stole data form air-gapped computer is found. Air-gapped computers that are isolated from the Internet and other computers are long considered to be the most secure and safest place for storing data in critical infrastructures such as industrial control systems, financial institutions, and classified military networks.
Continue reading “Transfer Stolen Data from Air-Gapped Computer by using HDD’s noise”
What is visual hacking? Spying what’s on others’ computer screens and desks.
3M’s 2016 Global Visual Hacking Experiment has found that the overwhelming majority of companies across the globe are not prepared to detect visual hacking in business office environments or to protect their most valuable information. To test the efficacy of visual hacking techniques, 3M had a white hat assume the role of a temporary office worker.
Continue reading “Visual Hacking and its success”