Author: John Wiley

John Wiley is a Cyber security Evangelist, Researcher, Author & Speaker. He is a Security Writer & Editor-in-Chief, Author of W-Se Web Security Council.

Complete Guide to the Best Device Security Protocols

Nowadays BYOD onboarding activities are being followed by staff, consumers and stakeholders at all levels. Luckily, businesses are completely able to limit access to the network before customers are accepted. When a user takes home a tablet, phablet, laptop, or smartphone and tries to connect to a Wi-Fi network, such links may be diverted to…

MalwareFox Features

MalwareFox is an antimalware solution which is becoming increasingly common among security programs. With the demand, it also poses concerns in people’s minds, whether usage is acceptable or healthy or not? Okay, let’s work this out. Features of MalwareFox MalwareFox antimalware solution offers protection for your device against any new and old malware attacks such…

Kali Linux 2020.2 Released with New Improvements

World’s leading Kali Linux 2020.2 penetration distribution launched with new updates, authentication improvements, PowerShell by design, and other features. With Kali Linux 2020.2 latest release, offensive security has introduced new dark and light themes for KDE Plasma. The KDE plasma is the desktop environment that KDE produces specifically for linux systems. Powershell has been added…

7 Factors That Affect Your Browser’s Performance

Don’t you find it annoying when your web browser starts lagging and acting out? You blame your web browser for being trash and bad at its job but in reality, it could be because of something that you are doing. There are many factors that determine how well your web browsers run, it could be…

SAP Security Updates May 2020 Include Six Essential Patches

SAP’s May 2020 Security Patch Day updates, published Tuesday by the company, include a total of 18 Security Notes and 4 updates to previous Notes, six of which are classified as Hot News. The most important of the Notes addresses a vulnerability to code injection in NetWeaver Application Server ABAP. Tracked as CVE-2020-6262 and featuring…

Hacker Group Advertises Numerous Violations of Data

A community of hackers have started advertising on the dark web data allegedly stolen as a result of several recent infringements, including those affecting Tokopedia, Styleshare, Minted, ChatBooks, and others. Known as “Shiny Hunters,” the group recently claimed responsibility for hacking Tokopedia, the largest online store in Indonesia, and claimed to have breached Microsoft’s GitHub…

ATM Developer Diebold Nixdorf Hit by Ransomware

ATM manufacturer Diebold Nixdorf announced on Monday that it had recently been hit by a piece of ransomware, but the company said that the incident only caused “a small IT machine failure.” Diebold Nixdorf told W-SE that the incident did not affect ATMs, customer networks or the general public and that “its effect was not…

Now that Everyone Works from Home, How is the Holding up of your Helpdesk?

If your company is one of the many that transitions to a modern workforce’s new “standard,” you understand the difficulties that come with helping staff, contractors, gig workers and others in the workplace make the transition to remote working. There’s a lot to learn in the new paradigm of home-based office environments, from getting the…

Maker Stadler Railway Vehicle Struck by Malware Attack

Railway rolling stock manufacturer Stadler Rail is currently investigating a malware attack that has forced off-line some of its networks. Headquartered in Bussnang, Switzerland, the company manufactures a variety of trains (high-speed, intercity, regional and commuter heavy rail, underground and tram) and trams, with approximately 11,000 employees at more than 40 sites. The Swiss manufacturer…

A Quick Overview About MobiKin Assistant for Android

As technology has evolved, mobile phones have become an important part of our lives. We have a lot of our memories packed in these tiny machines that we can’t even afford to lose. Most of the time, we don’t even create a backup, and when we decide to do so, it’s already too late. Well,…