Untangle VPN Services
This article by Abd El-Monem A. El-Bawab, the author of Untangle Network Security, covers the Untangle solution, OpenVPN. OpenVPN is an SSL/TLS-based VPN, which...
Signal introduces optional link previews to enable users understand what’s behind a URL
Signal, the encrypted communication App for iOs and Android, recently announced optional link previews for the four most popular sites- Imgur, Reddit, Instagram, and...
Brave Privacy Browser has a ‘backdoor’ to remotely inject headers in HTTP requests: HackerNews
Brave, the open source privacy- focussed browser, has allegedly introduced a ‘backdoor’ to remotely inject headers in HTTP requests that may track users, say...
DARPA on the hunt to catch deepfakes with its AI forensic tools underway
The U.S. Defense Advanced Research Projects Agency ( DARPA) has come out with AI-based forensic tools to catch deepfakes, first reported by MIT technology...
IBM’s DeepLocker: The Artificial Intelligence powered sneaky new breed of Malware
In the new found age of Artificial Intelligence, where everything and everyone uses Machine Learning concepts to make life easier, the dark side of...
Espressif IoT devices susceptible to WiFi vulnerabilities can allow hijackers to crash devices connected...
Matheus Eduardo Garbelini a member of the ASSET (Automated Systems SEcuriTy) Research Group at the Singapore University of Technology and Design released a proof...
3 cybersecurity lessons for e-commerce website administrators
In large part, the security of an ecommerce company is the responsibility of its technical support team and ecommerce software vendors. In reality, cybercriminals...
Anatomy of a Crypto Ransomware
Crypto ransomware is the worst threat at present. There are a lot of variants in crypto ransomware. Only some make it into the limelight,...
How has ethical hacking benefited the software industry
In an online world infested with hackers, we need more ethical hackers. But all around the world, hackers have long been portrayed by the...
MarioNet: A browser-based attack that allows hackers to run malicious code even if users’...
If you think closing down a website, closes down the possibility of the device being tracked, then you are wrong! Some Greek researchers have...