Cybersecurity

Read the latest Cybersecurity news on the Packt Hub. We feature up-to-date articles on IT security and hacking. We also feature the latest software security updates and cyber security threats.

Software infrastructure in 2019

Key trends in software infrastructure in 2019: observability, chaos, and cloud complexity

0
Software infrastructure has, over the last decade or so, become a key concern for developers of all stripes. Long gone are narrowly defined job...
Top 5 cybersecurity assessment tools for networking professionals

How cybersecurity can help us secure cyberspace

2
With cybercrime on the rise, companies have started adopting the hard ways of preventing system breaches. Cybersecurity has become the need of the hour....
AI attack

Malicious code in npm ‘event-stream’ package targets a bitcoin wallet and causes 8 million...

0
Last week Ayrton Sparling, a Computer Science major at CSUF, California disclosed that the popular npm package, event-stream, contains a malicious package named flatmap-stream. He disclosed the issue...
IoT (Internet of Things)

How to stop hackers from messing with your home network (IoT)

0
This week, NCCIC, in collaboration with cybersecurity authorities of Australia, Canada, New Zealand, the United Kingdom, and the United States released a joint ‘Activity...
Switching to Python

Fake Python libraries removed from PyPi when caught stealing SSH and GPG keys, reports...

0
Yesterday, ZDNet reported that the Python security team removed two fake Python libraries from PyPI (Python Package Index). These libraries were caught stealing SSH...
contactless Visa card

Researchers reveal vulnerability that can bypass payment limits in contactless Visa card

0
A few days ago, researchers from Positive technologies discovered flaws in Visa contactless cards, which allow hackers to bypass the payment limits. This research...
Fake news concept, internet social network.

Virality of fake news on social media: Are weaponized AI bots to blame, questions...

0
A lot of fake news has been spreading in recent times via social media channels such as Facebook, Twitter, Whatsapp, and so on. A...
ESA data leak security

Why scepticism is important in computer security: Watch James Mickens at USENIX 2018 argue...

0
"Technology, in general, and computer science in particular, have been hyped up to such an extreme level that we've ignored the importance of not...
Top 5 cybersecurity assessment tools for networking professionals

FreeRTOS affected by 13 vulnerabilities in its TCP/IP stack

0
FreeRTOS, a popular real-time operating system kernel for embedded devices, is found to have 13 vulnerabilities, as reported by Bleeping Computers yesterday. A part...
protest

Australia’s Assistance and Access (A&A) bill, popularly known as the anti-encryption law, opposed by...

0
Last week, Australia’s Assistance and Access (A&A) anti-encryption law was passed through Parliament, which allows Australian police and government the powers to issue technical...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews