Author: John Wiley

John Wiley is a Cyber security Evangelist, Researcher, Author & Speaker. He is a Security Writer & Editor-in-Chief, Author of W-Se Web Security Council.

OpenAL Software- Do You Have to Hold it or Delete it From Your Computer?

OpenAL is not a virus, but what should you do when everyone’s thinking about the problem. OpenAL usually does not use much CPU or memory on Windows, Open AL is dispensable when playing games like NFS. You won’t know something about OpenAL until you have a new graphics card on your Mac. You will see…

Business Intelligence is the Secret to Improved Cybersecurity – Why?

For a number of years now, cybersecurity has pushed further and further to top of the corporate agenda for very good reason. However, how much do we understand the importance of analytics when we remain protected? According to a recent McAfee Labs report, 480 new threats to data security are found every minute in 2018–a…

Intel Announces Lifecycle Insurance to Protect Supply Chain Platform

Globalization and business transformation have created for almost every manufacturer an incredibly complex worldwide supply chain. Hardware ostensibly manufactured in the US would inevitably include components produced in various places around the world— including nations described as “adversarial States” in other circumstances. There is the potential for interference by foreign governments or criminal gangs in…

HackerOne Received Official Hacker Files

After one of the security analysts on the platform unintentionally posted a session cookie, a hacker might access private customer reports on HackerOne. The occurrence happened during an online exchange last week on a bug bounty report submitted by the hacker to HackerOne. The HackerOne Security Analyst directly copied a cURL command to the hacker…

The Dark Web Hits Your Mobile Phone

Deep internet and privacy enthusiasts have a lot to rejoice at as the Tor Project announces its popular Android Tor Browser. Tor Project Members claim that the browser is now in Alpha and can be installed first via Orbot. Users may start accessing the Dark Web via their mobile device by going to the Google…

How is WPA-WPA2 Crack WiFi Network Passwords Enabled?

The new method for cracking WPA / WPA2 allowed the vulnerability of WiFi networks to pre-shared key-hash attackers using targeted victims ‘ passwords. This technique was discovered during an attack against the recently released WPA3 security standard which is incredibly difficult to break since its current key setup protocol, the Simultaneous Authentication of Equals (SAE),…

Google: 80% of Android Apps Default Encrypt Traffic

Google has shared some information on the adoption of TLS by Android apps, and significant progress seems to have been made over the last two years. According to Google, 80% of Android apps now aim to encode traffic and, for applications developed for the most recent versions of the operating system, the percentage is higher….

Critical Code Execution Vulnerability Found in GoAhead Web Server

Engineers at Cisco Talos have found two GoAhead embedded web server vulnerabilities, including a critical flaw that can be exploited to execute the remote software. GoAhead, developed by EmbedThis, is marketed as “the world’s most popular small embedded Web server.” Both open source as well as company versions are available. A GoAhead quest for Shodan…

Why Should SSDP / UPnP be Disabled in Today’s Home and Business?

When were UPnP and SSDP mainstream? Universal Plug and Play (UPnP) was considered revolutionary when it was launched 19 years ago in 2000 with the Windows Millennium Edition. It was compromised by the expectation that’ smart’ devices would be automatically identified in the home and the workplace using a Windows PC. It was the age…

This is How YourBittorrent has Become an Internet Dominant Force

De-centralized peer-to-peer sharing, YourbitTorrent is one of the first torrent websites on the internet. When people upload or download content transfer files, the request is supplemented by bandwidth. In the run-up to the split, Yourbittorrent was once part of mybittorrent.com; however, it collected and evaluated torrents on its own in the torrent ring. That said,…