The social media giant has revealed that a large number of user passwords were stored in a ‘readable format’ in its internal systems. Most of the passwords found belonged to users of Facebook Lite — a smaller version of the Facebook app meant for low data usage. Facebook disclosed another major privacy revelation in its platforms. In an official blog ...
Read More »Blog
Magecart group breaks into MyPillow and Amerisleep websites, potentially stealing credit card information
While MyPillow was hit with Magecart attacks in 2018, Amerisleep is said to be targeted as early as 2017. The pillow manufacturing company has reworked the site after the attack but Amerisleep is still to respond with a fix. The Magecart group — known for its notorious credit card skimming attacks, makes headlines again. This time, it has found targeting ...
Read More »Security Of Enterprise Wireless Networks
Providing enterprise network security is becoming an increasingly complex undertaking, as the number of threats emanating from the Internet continues to grow. Hackers continue to find new ways to attack systems and steal data. Dealing with these threats is highly complex. While numerous reviews like this may indicate that virtual private networks can protect you against all threats, getting on top of ...
Read More »LAW ENFORCEMENT AGENCIES ACROSS THE EU PREPARE FOR MAJOR CROSS-BORDER CYBER-ATTACKS
The possibility of a large-scale cyber-attack having serious repercussions in the physical world and crippling an entire sector or society, is no longer unthinkable. To prepare for major cross-border cyber-attacks, an EU Law Enforcement Emergency Response Protocol has been adopted by the Council of the European Union. The Protocol gives a central role to Europol’s European Cybercrime Centre (EC3) and ...
Read More »Chinese government departments targeted with GandCrab v5.2 ransomware
The malware comes concealed as an archive named ‘03-11-19.rar’. The phishing attack has started since March 11, 2019. A new phishing campaign that leverages GandCrab v5.2 ransomware to infect the Chinese government officials has been discovered recently. The malware comes concealed as an archive named ‘03-11-19.rar’. How does it work – According to China’s Internet Network Information Center, the phishing attack ...
Read More »‘Gnosticplayers’ is now selling another 26 million user records on the Dark Web
Gnosticplayers had earlier exposed more than 840 million user records during the month of February. This is the fourth time the attacker has put a trove of sensitive information out in the open. Gnosticplayers, the infamous hacker who exposed and sold millions of user records in early 2019, has yet again come out with a new batch of user records ...
Read More »Juniper Networks boosts firewall performance with new processing card
Juniper Networks is upgrading its services processing card to try and keep up with increasingly complicated security demands that come with the rise of IoT, 5G and the enterprise edge. The networking product company announced last week their latest services processing card for the SRX5400, 5600 and 5800 next-generation firewalls, the SPC3. In an Aug. 7 press release, Juniper said the new card transforms ...
Read More »IT Act Amendment Bill to be tabled in ongoing winter session of Parliament
With social media gaining prominence, the Union Ministry of Electronics and IT has made amendments to Information Technology (IT) Act 2000, which is likely to be introduced in the ongoing winter session of Parliament. A Cabinet note has been readied by the ministry. The note has already received a legal vetting from the law ministry, a senior government official told ...
Read More »HOW DISRUPTIVE TECHNOLOGIES ARE TRANSFORMING THE CYBER SECURITY LANDSCAPE
In this digital savvy world, what could be the most daunting nightmare of a technophile? Cyber-crime, evidently! Yes, online privacy and data breaches can shoot nervous breakdown of a tech-geek. And the way to ride out this issue is efficient cyber security, for sure! The nexus of techniques and tools to protect computer networks, programs, and data from illegitimate access ...
Read More »DLL Hijacking attacks: What is it and how to stay protected?
DLL Hijacking attacks are broadly categorized into three types – DLL search order attack, DLL side-loading attack, and Phantom DLL Hijacking attack. For DLL hijacking attack to be successful, it would require an attacker to trick victims to open a file using a vulnerable application from a remote network location. DLL Hijacking is an attack vector that could allow attackers ...
Read More »