Home Security News Cybersecurity News

Cybersecurity News

Read the latest Cybersecurity news on the Packt Hub. We feature up-to-date articles on IT security and hacking. We also feature the latest software security updates and cyber security threats.

Public Key Infrastructure (PKI) and other Concepts in Cryptography for CISSP Exam

Public key infrastructure Public Key Infrastructure (PKI) is a framework that enables integration of various services that are related to cryptography. The aim of PKI is...
tools to stay anonymous online

10 great tools to stay completely anonymous online

Everybody is facing a battle these days. Though it may not be immediately apparent, it is already affecting a majority of the global population. This...

Knowing the SQL-injection attacks and securing our Android applications from them

(For more resources related to this topic, see here.) Enumerating SQL-injection vulnerable content providers Just like web applications, Android applications may use untrusted input to construct...
Linux Foundation launches the Acumos Al Project to make AI accessible

How artificial intelligence can improve pentesting

686 cybersecurity breaches were reported in the first three months of 2018 alone, with unauthorized intrusion accounting for 38.9% of incidents. And with high-profile...
NetSpectre attack exploits data from CPU memory

Dark Web Phishing Kits: Cheap, plentiful and ready to trick you

Spam email is a part of daily life on the internet. Even the best junk mail filters will still allow through certain suspicious looking...
Teenage Hacker Girl Attacks Corporate Servers in Dark, Typing on Red Lit Laptop Keyboard. Room is Dark

Twitter memes are being used to hide malware

Last week, a group of security researchers reported that they have found a new malware that takes its instructions from code hidden in memes...
Top 5 cybersecurity assessment tools for networking professionals

Top 5 cybersecurity assessment tools for networking professionals

Security is one of the major concerns while setting up data centers in the cloud. Although firewalls and managed networking components are deployed by...
AI attack

New cybersecurity threats posed by artificial intelligence

In 2017, the cybersecurity firm Darktrace reported a novel attack that used machine learning to observe and learn normal user behavior patterns inside a...
ship in sea

How to secure ElasticCache in AWS

AWS offers services to handle the cache management process. Earlier, we were using Memcached or Redis installed on VM, which was a very complex...

Encode your password with Spring Security 3

This article by Peter Mularien is an excerpt from the book Spring Security 3. In this article, we will: Examine different methods of configuring password encoding Understand...

Must Read in Security

Why is iOS 12 a top choice for app developers when...

When it comes to mobile operating systems, iOS 12 is generally considered to be one of the most secure — if not the leader...

Interviews