Tag: Using
-
A Quick Guide to Using the ONG-C2M2 Model
The Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (ONG-C2M2) can help oil and natural gas (ONG) organizations …
-
SCANdalous! (External Detection Using Network Scan Data and Automation)
Real Quick In case you’re thrown by that fantastic title, our lawyers made us change the name of this project so we wouldn’t get sued. …
-
Using Adversarial Machine Learning, Researchers Look to Foil Facial Recognition
For privacy-seeking users, good news: Computer scientists are finding more ways to thwart facial and image …
-
POS Malware Using DNS to Steal Payment Card Data
Fraudsters are using a revamped version of the Alina Trojan to target Windows-based point-of-sale devices to steal payment card data, …
-
Using confidential computing to protect Function-as-a-Service data
Organizations are embracing the power of Function-as-a-Service (FaaS). FaaS can be viewed as a very positive and beneficial result coming …
-
Nationwide Facial Recognition Ban Proposed By Lawmakers
Lawmakers have proposed legislation that would indefinitely ban the use of facial recognition technology by law enforcement nationwide. The …
-
Using Cisco Webex for your video conferencing needs? Go patch!
Cisco has released security updates for Cisco Webex Meetings and Cisco Webex Meetings Server that fix several remotely exploitable …
-
AcidBox Malware Uncovered Using Repurposed VirtualBox Exploit
Advanced malware, dubbed AcidBox, has been identified by researchers who say a mysterious cybergang used it twice against Russian …
-
Implementation of Hybrid Encryption Using Java 1.8 and OpenSSL
Symmetric encryption is a type of encryption in which a single key is used to both encrypt and decrypt the data. Whereas in asymmetric …
-
Invoking WCF Service Secured With Basic Authentication Using SoapUI
In this post, we will demonstrate how to use the SoapUI API tool to invoke a secured WCF SOAP service. First, we will create a service …
-
Now’s The Perfect Time to Start Using a Password Manager
Here’s why: The more you browse, the better password managers …
-
Group Behind WannaCry Now Using New Malware
A sophisticated hacking group associated with the North Korean government that’s been tied to a number of high-profile attacks, including …
●●●