Author: John Wiley

John Wiley is a Cyber security Evangelist, Researcher, Author & Speaker. He is a Security Writer & Editor-in-Chief, Author of W-Se Web Security Council.

Office 365 To Get Microsoft Recommended Security Profiles

The development team of Microsoft is currently working on adding the recommended Exchange Online Protection (EOP) and Office 365 Advanced Threat Protection (ATP) security profiles later this month. “There are two levels of security, Exchange Online Protection and Office 365 Advanced Threat Protection that we are recommending to enable security administrators to customize their security…

Official: Russian-owned Ohio Election Hack Attempted

An electoral cyberattack was detected and thwarted by Ohio earlier this month, the head of the state election said. Republican State Secretary Frank LaRose said on November 5, the “relatively sophisticated” hacking attempt was originated in Panama but traced to a Russian-owned enterprise. LaRose told The Columbus Dispatch Tuesday that the hackers wanted to find…

What is Virtual Firewall and How does it Function?

What about virtual firewall? We all know the conventional network firewall to inspect packets to monitor and control inbound and outbound network traffic, which is based on defined security policy guidelines. A virtual firewall also has the same function; it provides network traffic filters for virtual machines (VMs) in virtualized environments when used as a…

The Best Proxy Servers and How to Keep the Hackers Safe

Did you notice that you see any websites blocked or inaccessible for your IP address while browsing? Well, only Proxy servers can access these websites. But what is a Proxy Server exactly? Proxy server is a computer that serves as a mediator between you and the blocked site by secretly protecting your identity. Because the…

Polymorphic Refers to the Ability of Malware to Change

Polymorphic refers to a malware’s ability to change itself and its identifiable features to avoid detection in the case of malicious programs. Some forms of malware, including viruses, trojans, keyloggers and many more, can take a polymorphic shape. This strategy involves constantly changing features such as a file name or encryption keys, so that traditional…

How Can I Handle DNS Vulnerabilities?

Believe it or not, all domain names (nodes) in one file, the host file, were listed at the beginning of the Internet. Today the host file has only been deleted so that an IP address can be redirected to a certain domain name, which the operating system first checks before the DNS servers are queried….

Easy Website Malware Removal Instantly

How to patch your website malware? If your page is compromised, it is most important that you take the right action to repair it. This instruction will show you how to retrieve your website at a time with one step. Check for infections on your PC You will eliminate the possibility that your PC was…

Hackers Platform User Data Reached

The Magento e-commerce platform owned by Adobe has recently notified some Magento Marketplace users that unlicensed third parties have been given access to account information. The attackers, Magento said, exploited the Magento Marketplace vulnerability which enabled them to access information such as name, e-mail, MageID, shipping and billing address, telephone number, and some commercial information…

Introduction to the Tutu Software and its Safety Aspects

Tutu app: What is it? Today’s Tutu App allows you to download and install premium games and apps for free, as well as in Android and iOS. At the same time, most users question whether or not the Tutu App is secure. Let’s talk about it here after the normal introduction… Tutu App is an…

Dexphot Malware uses Evade Detection Randomisation, Encryption and Polymorphism

Microsoft has been tracking malware for more than a year using numerous evasion techniques, including random file names, fileless install and polymorphism. Microsoft which calls Dexphot malware has found that it has tried deploying files that have modified 2 or 3 times an hour. The polymorphic malware was targeted at thousands of devices and executed…