New technologies are becoming digital marketers best friend. As we have seen in our previous article, with the B2B marketplace the implementation of new technologies (mobile platform), has become essential in the formulation of future strategies for leading marketers. The travels industry which has always been a pioneer in digital marketing, mainly of its early successful use of online booking, is using AI and machine learning to better facilitate the changing demands of their clients.
Protect your code – protect your data
Responsibility for securing enterprise applications has been moving down the development lifecycle, and for good reason. It not only makes the enterprise obtain security, but also saves companies time and money. In this article, we can talk about code security and what its impact.
‘Freebooting’ vulnerability in Facebook tool
NETMYSOFT Chief Technical Officer (CTO) Laxman Muthiyah spotted a freebooting vulnerability on Facebook‘s Rights Manager platform. Freebooting means the act of downloading someone else’s pirated content and uploading it on another online platform.
“HOMEKit” the Exploit Generator Used to Deliver Espionage Malware
Specialists believe that cyber attackers used the toolkit, dubbed “HOMEKit” by Palo Alto Networks, to generate malicious Microsoft Word documents for various campaigns since 2013. Similar to the MNKit exploit generator, HOMEKit relies on the CVE-2012-0158 vulnerability in Office to deliver malware.
Transfer Stolen Data from Air-Gapped Computer by using HDD’s noise
According to the hackernews, a new way to stole data form air-gapped computer was found. The technique got the name “DiskFiltration” and it is as interesting as it sounds. Air-gapped computers are compuers isolated from the Internet and other devices. Specialists considered for a long time thaty they are the most secure and safest place for storing data in critical infrastructures such as: industrial control systems financial institutions classified military networks.
Blockchain technology- the new internet of value
Created by the mysterious hacker known as Satoshi Nakamoto, the blockchain technology — the distributed ledger technology that underlies the Bitcoin virtual currency — Blockchain has the potential to upend industries from finance to real estate to entertainment. In the simplest terms, the blockchain transfers value from one party to another over the Internet. That could be money, a share of stock, a property deed, a digital royalty—even a vote cast in an election.
Israeli parliament recommended the creation of national central cyber-authority
Israel will consolidate the strands of its cyber-security apparatus under one roof, according to the coutry’s parliament, the Knesset.
Visual Hacking and its success
What is visual hacking? In essence, visual hacking is spying what’s on others’ computer screens and desks. 3M’s 2016 Global Visual Hacking Experiment has found that the overwhelming majority of companies across the globe are not prepared to detect visual hacking in business office environments or to protect their most valuable information. To test the efficacy of visual hacking techniques, 3M had a white hat assume the role of a temporary office worker.
Gmail flags dangerous emails
Google added new alerts to Gmail this week in order to improve the security of its users. The Gmail alerts inform the users when Google can’t authenticate messages and when they contain dangerous URLs. Gmail is now alerting users whenever they receive messages that can’t be authenticated with either Sender Policy Framework(SPF) or DKIM. The alert comes in the form of a question mark instead of the sender’s profile photo, corporate logo, or avatar. Additionally, Google is alerting Web users…
Linux flaw allows hijacking web connections
Linux flaw? According to the (www.securityweek.com), researchers from the University of California, Riverside and the U.S. Army Research Laboratory discovered that a Transmission Control Protocol (TCP) specification implemented in Linux (a flaw) creates a vulnerability that can be exploited to terminate connections and conduct data injection attacks by using a method that allows a blind, off-path attacker to intercept TCP-based connections between two hosts on the Internet.