DCLeaks and Guccifer 2.0: How hackers used social engineering to manipulate the 2016 U.S....
It’s been more than a year since the Republican party’s Donald Trump won the U.S Presidential elections against Democrat Hillary Clinton. However, Robert Mueller...
Preventing SQL Injection Attacks on your Joomla Websites
Introduction
Mark Twain once said, "There are only two certainties in life-death and taxes." Even in web security there are two certainties: It's not "if...
Resecurity reports ‘IRIDUIM’ behind Citrix data breach, 200+ government agencies, oil and gas companies,...
Last week, Citrix, the American cloud computing company, disclosed that it suffered a data breach on its internal network. They were informed of this...
How to protect your VPN from Data Leaks
The following news story was reported by the Nine Network just a week after New Year's Day: an English teacher from Sydney was surprised...
5 lessons public wi-fi can teach us about cybersecurity
Free, public Wi-Fi is now crucial in ensuring people stay connected where a secure network is absent or mobile data is unavailable. While the...
Introducing Firefox Sync centered around user privacy
“Ensure the Internet is a global public resource… where individuals can shape their own experience and are empowered, safe and independent.”
-Team Mozilla
Yesterday, Firefox explained...
Canva faced security breach, 139 million users data hacked: ZDNet reports
Last Friday, ZDNet reported about Canva’s data breach. Canva is a popular Sydney-based startup which offers a graphic design service. According to the hacker,...
Meet ‘Gophish’, the open source Phishing Toolkit that simulates real world phishing attacks
Phishing attacks these days are a common phenomenon. Fraudsters use technical tricks and social engineering to deceive users into revealing sensitive personal information such...
Defensive Strategies Industrial Organizations Can Use Against Cyber Attacks
Industrial organizations are prime targets for spies, criminals, hacktivists and even enemy countries. Spies from rival organizations seek ways to access industrial control systems...
Remote Code Execution Flaw in APT Linux Package Manager allows man-in-the-middle attack
Yesterday a remote code execution bug was found in the APT high-level package manager used by Debian, Ubuntu, and other related Linux distributions. Max...