Thursday, September 20, 2018

Pegasus Spyware Conducting Surveillance Operations in 45 Countries

New research reveals that Israel based NSO Group using powerful mobile based Pegasus Spyware to conducting massive surveillance in 45 countries across the globe. NSO Group is operating from Israel where...

Most Important USB Memory Sticks based Cyber Attack Mitigation Steps

Among the ten major cyber threats identified by BSI in 2016, the use of portable peripheral devices ranks second. While the same agency suggests engaging in countermeasures aimed at implementing targeted procedures based...

Extremism on line, ISIS, terrorism

Extremism onlineIdentifying extremists online even before they post dangerous contentPublished 19 September 2018The number and size of online extremist groups using social networks to harass users, recruit new members, and...

US Dept of State says attack on email system exposed employees’ personal data

Well, this is embarrassing. The US Department of State has confirmed that it has suffered a data breach which exposed the personally identifiable information of some employees. News of the breach was...

Mobile and Digital Payments: Worth the Risk?

Thanks in part to the convenience that our mobile devices provide for us, much of the world operates now on instant gratification. From accessing information on the web to doing...

Cisco Data Center Network Manager Cross-Site Scripting Vulnerability

'+h2+'' + moretext + ''; $t(this).html(html); ...

New Xbash Malware Attack on Linux & Windows with Botnet, Ransomware

Newly discovered Xbash malware with multiple capabilities such as  Botnet, Ransomware & Coinminer to compromise windows and Linux machine which is controlled under the Iron-based threat actor group. Xbash malware has strong intrusion capabilities especially...

Insights on the Capabilities of Three Politically-Themed Ransomware Campaigns

We all hear politicians’ names week over week – what policies they’re working on, new initiatives they’re implementing for their respective country, the list goes on. And now, we’re hearing...

Wi-Fi Devices Can be Used to Detect Weapons and Bombs

Dangerous Objects such as weapons, Bombs, and chemicals that are hidden in baggage can be detected with Wi-Fi signals from normal Wi-Fi devices without opening it. Researchers from Rutgers University demonstrated...

Political Figures Differ Online: Names of Trump, Obama, Merkel Attached to Ransomware Campaigns

Politics and ransomware. No, it’s not a lost single from the Oasis back catalogue, but in fact a relatively recent tactic by ransomware developers looking to exploit the profiles of...

LATEST NEWS

MUST READ