Cybersecurity

Read the latest Cybersecurity news on the Packt Hub. We feature up-to-date articles on IT security and hacking. We also feature the latest software security updates and cyber security threats.

Microsoft contractors also listen to Skype and Cortana audio recordings

Microsoft contractors also listen to Skype and Cortana audio recordings, joining Amazon, Google and...

0
In a recent report, Motherboard reveals, “Contractors working for Microsoft are listening to personal conversations of Skype users conducted through the app's translation service.”...
Apple iOS 12 beta 2

Google’s Project Zero reveals several serious zero-day vulnerabilities in a fully remote attack surface...

0
Security analysts from Google’s Project Zero investigated the remote attack surface of the iPhone and reviewed SMS, MMS, VVM, Email, and iMessage. They found...
Fancy bear

Microsoft reveals Russian hackers “Fancy Bear” are the culprit for IoT network breach in...

0
Two days ago, Microsoft revealed that Russian hackers are attempting to compromise IoT devices including a VOIP, a printer, and a video decoder across...
vulnerability

What is a Magecart attack, and how can you protect your business?

0
Recently, British Airways was slapped with a $230M fine after attackers stole data from hundreds of thousands of its customers in a massive breach....
Capital One data breach

Following Capital One data breach, GitHub gets sued and AWS security questioned by a...

0
Last week, Capital One revealed it was subject to a major data breach due to a configuration vulnerability in its firewall to access its...
dark web spy spy

Mimecast introduced community based tailored threat intelligence tool at Black Hat 2019

0
Yesterday, at Black Hat 2019, Mimecast Limited, a leading email and data security company, introduced Mimecast Threat Intelligence which offers a deeper understanding of...
vulnerability

A JIRA misconfiguration exposed employees and project details of NASA, Google, Yahoo, and many...

0
Last week, Avinash Jain, a Lead Infrastructure Security Engineer at Grofers, reported that a misconfiguration in JIRA publicly exposed sensitive information about employees and...
ESA data leak security

ESA’s E3 web security negligence endangers more than 2000 game media journalists, investors, after...

0
A few days ago, the Entertainment Software Association accidentally leaked a spreadsheet including personal information of about 2,025 games industry journalists, content creators, video...
contactless Visa card

Researchers reveal vulnerability that can bypass payment limits in contactless Visa card

0
A few days ago, researchers from Positive technologies discovered flaws in Visa contactless cards, which allow hackers to bypass the payment limits. This research...
Apple

Google Project Zero reveals six “interactionless” bugs that can affect iOS via Apple’s iMessage

0
Yesterday, two members of the Google Project Zero team revealed about six “interactionless” security bugs that can affect iOS by exploiting the iMessage Client....

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews