Cybersecurity

Read the latest Cybersecurity news on the Packt Hub. We feature up-to-date articles on IT security and hacking. We also feature the latest software security updates and cyber security threats.

DCLeaks and Guccifer 2.0: How hackers used social engineering to manipulate the 2016 U.S....

0
It’s been more than a year since the Republican party’s Donald Trump won the U.S Presidential elections against Democrat Hillary Clinton. However, Robert Mueller...

Preventing SQL Injection Attacks on your Joomla Websites

0
Introduction Mark Twain once said, "There are only two certainties in life-death and taxes." Even in web security there are two certainties: It's not "if...
Ecuador data breach

Resecurity reports ‘IRIDUIM’ behind Citrix data breach, 200+ government agencies, oil and gas companies,...

0
Last week, Citrix, the American cloud computing company, disclosed that it suffered a data breach on its internal network. They were informed of this...
Kubernetes security

How to protect your VPN from Data Leaks

0
The following news story was reported by the Nine Network just a week after New Year's Day: an English teacher from Sydney was surprised...
The dangers of public wi-fi

5 lessons public wi-fi can teach us about cybersecurity

0
Free, public Wi-Fi is now crucial in ensuring people stay connected where a secure network is absent or mobile data is unavailable. While the...
ESA data leak security

Introducing Firefox Sync centered around user privacy

0
“Ensure the Internet is a global public resource… where individuals can shape their own experience and are empowered, safe and independent.” -Team Mozilla Yesterday, Firefox explained...
hacker

Canva faced security breach, 139 million users data hacked: ZDNet reports

0
Last Friday, ZDNet reported about Canva’s data breach. Canva is a popular Sydney-based startup which offers a graphic design service. According to the hacker,...

Meet ‘Gophish’, the open source Phishing Toolkit that simulates real world phishing attacks

0
Phishing attacks these days are a common phenomenon. Fraudsters use technical tricks and social engineering to deceive users into revealing sensitive personal information such...
Top 5 cybersecurity assessment tools for networking professionals

Defensive Strategies Industrial Organizations Can Use Against Cyber Attacks

0
Industrial organizations are prime targets for spies, criminals, hacktivists and even enemy countries. Spies from rival organizations seek ways to access industrial control systems...
Kali Linux 2018.1 released

Remote Code Execution Flaw in APT Linux Package Manager allows man-in-the-middle attack

0
Yesterday a remote code execution bug was found in the APT high-level package manager used by Debian, Ubuntu, and other related Linux distributions. Max...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews