Security

Facebook Bug – A Bad Code Allowed Anyone to View Page Admin

Last week Facebook rushed to patch an error that exposed accounts of people who manage pages after several high-profile pages were exploited by their weakness. If the owner of a Facebook page edits a message, users may track changes using the’ See Edit History ‘ function. It function would inform the consumer precisely when a…

BlackBerry announces a solution to automotive safety

This week, BlackBerry unveiled a customized car solution to help OEMs improve the health and protection of cars. The plan seeks to provide the requisite basis for cars that are “future-proof,” as well as to help speed up production times and rising start-up costs. With the new solution at hand, and with the help of…

Canadian laboratory testing company pays the ransom to protect the compromised information

LifeLabs, a laboratory test company, confirmed Tuesday it charged a ransom to protect information for Canadians that was hacked at the end of October in a data breach. Hackers have accessed personal information from an unknown number of the 15 million Canadian users of the organization, primarily in Ontario and British Columbia. Health card numbers,…

UTM Vs Firewall Know the Difference in Selecting the Right Defense

The use of any form of firewall is an element of cyber security; it relates to device or network security and data security for any person or company. Today, we have the NGFW firewall, which helps to improve security. At the same time, the UTM (Unified Threat Management) tool is another alternative, a rather multi-purpose…

TOP 10 PHP Scanners of Vulnerability

Automation is the name of the game in today’s world. People expect a quicker way of doing the job, meeting deadlines and settling commitments. The same goes for the security industry, the profession of system manager and web developers; automation reduces the time to complete tasks. PHP, a well-known web development language, is a very…

Plundervolt Attack Uses Intel Chip Voltage to Steal Data

A recently reported attack targeting Intel processors uses CPU voltage changes to reveal data stored with Intel Software Guard Extensions (SGX). A group of researchers from University of Birmingham, UK; Graz University of Technology, Austria; and the imec-DistriNet Research Group of KU Leuven, Belgium, discovered the attack, known as the “Plundervolt” and followed as the…

Ryuk Ransomware Damage Large Files Updated

A recent update to the Ryuk ransomware has led to damage to large files that Emsisoft security researches warn that the malware has crypted. Initially discovered last year, the ransomware Ryuk has been used in public as well as private attacks and is typically used by exploiting existing malware in the target networks. Emsisoft says…

Password Managers store passwords on hardware in plaintext

Three hardware-based password voults have been analyzed by a security researcher and credentials stored in plaint text and hardware resets survive. An investigation into these three stand-alone password managers discovered that data can be read directly from chips on the board through hardware hacking, explains security researcher Phil Eveleigh. RecZone Password Safe, FAST Passwords and…

The Distinction Between Malware, Spam and Phishing

According to Sophos ‘ annual risk report on Internet security, phishing, malware attacks and spam reports are rising across social networks. The following analyzes: Malware A malware attack is a bit of malicious code that takes control over the machine of a person with a certain purpose in order to spread the bug over computers…

Top 10 Torrent Alternatives

The Pirate Bay (TPB) is the king of websites for torrent downloads, but the server downtimes have risen since late. It has also disconnected its room in the darknet and blocked the site in several parts of the world. In two separate occasions, cryptocurrency mining using the CPU of its guests was discovered, a simple…