Month: July 2017

  • Citrix NetScaler Unified Gateway Provides One Time Password (OTP), Natively

    NetScaler Unified Gateway is a Single Sign-On and an SSL VPN solution. It provides consolidation of all remote access solutions and allows an end-to-end SSO across all applications. Read full news article on DABCC  

  • Airborne Drones can be hijacked using $15 BBC’ Micro:bit

    Cauquil presented his findings at the DEF CON hacking conference held in Las Vegas on Friday. As per his research, it was quite easy to configure a mini microcomputer to record keystrokes from a wireless keyboard. Read full news article on HackRead  

  • Hackers Compromise Accounts of FireEye Threat Intelligence Analyst

    A hacker or group of hackers claimed today to have breached FireEye’s Mandiant. In a Pastebin post, they claimed, “It was fun to be inside a giant company named ‘Mandiant’… Read full news article on SecurityWeek  

  • Hacker claims to have stolen unreleased Game of Thrones episodes: report

    may have become the latest Hollywood victim of cybercrime, according to a new report. On Monday, HBO chairman and CEO Richard Plepler sent an email out to HBO employees alerting and assuring them that the Time Warner-owned company is “working round the clock to protect our collective interests” with law enforcement and outside cybersecurity-focused organizations. Read…

  • Udachi Microsoft: Russian antitrust authorities to rule on Kaspersky complaint soon

    Kaspersky has been running a battle against Microsoft’s free Windows Defender software since last year, and that included making an official complaint to the European, German and Russian antitrust authorities. Eugene Kaspersky, of the eponymous company, made some specific complaint, saying Microsoft automatically turned Windows Defender on when a 3rd party antivirus subscription expired. Read…

  • Businesses don’t know how to protect against DDoS attacks

    A distributed denial of service or DDoS is a method used to deny access for legitimate users of an online service. This service could be an e-commerce website, a bank, a SaaS application, or any other type of network service. Read full news article on BetaNews  

  • The Justice Department wants to help you run a vulnerability disclosure program

    These vulnerability disclosure programs, typically known as bug bounties, are typically created to allow participating parties to receive confidential information from independent researchers about software and hardware bugs that are affecting a company’s own systems or products. But the practice can sometimes run up against legal complications tied to the Computer Fraud and Abuse Act,…

  • Majority of Companies Get Failing Grades on Cybersecurity Performance

    How do you think your cybersecurity investments and performance would hold up if they were graded? Do you think your company is doing an above average job in this area? Read full news article on IT Business Edge  

  • International Threat Intelligence and Info-Sharing Surges in 2017

    With cybersecurity a global issue, organizations worldwide are sharing information and threat intelligence—which usually requires language translations. In the last year, those translations have surged by triple digits, indicating robust information-sharing practices amid several notable cybercrime incidents. Read full news article on Infosecurity  

  • DEF CON attendees make short work of electronic voting machines

    Attendees to the 25th annual DEF CON hacking conference discovered weak spots in electronic voting machines that attackers could abuse in future compromises. For their first-ever Voting Machine Hacking Village, DEF CON’s organizers purchased 30 electronic voting machines off eBay and left them to the mercy of attendees’ hacking skills. Read full news article on…

  • Machine learning system to create invisible malwares – gym-malware

    In the recent DEF CON Meet, technical director of security shop Endgame Hyrum Anderson disclosed a research paper on adapting API frameworks in building a malware that AV engines cannot identify. The core function of the system is to build a legitimate looking app by making minor changes to the original app that can avoid…

  • The HTTP series (Part 5): Security

    If you followed along the HTTP series, you are ready now to embark on a journey of HTTP security. And a journey it will be, I promise Many companies have been a victim to security breaches. Read full news article on THE CODE PROJECT