I have read an interesting article in our partner's website recently about an employer who read the employee's messages to make sure she is not doing anything else rather than her regular job at the office. Photo: In the article you will find detailed information about the legal aspects of such incident, s

Have you ever wondered how much is your email password worth? It depends what data are you trying to protect in electronic form using that password. John Brennan, Director of the Central Intelligence Agency (Photo: Data security is a major issue for businesses and organizations today. That is why a gro

Symantec has detected up to 20,000 daily attempts to exploit a recently patched Joomla vulnerability that can be leveraged for remote code execution. Photo: The vulnerability, identified as CVE-2015-8562, was patched in mid-December with the release of Joomla 3.4.6 and hotfixes for versions 1.5 an

Passwords are a vital component used to access digital assets, that is why "Password Hygiene" is one of the highest priority requirements in large organizations. There are some common-sense guidelines that should be followed for a Good Password Hygiene to secure sensative data at work and in your pesonal lif

While education and efforts around online credentials are improving, password hygiene still has problems Image: The Balance 60% of employees do work activities from a personal device 55% of employees do personal activities on work devices Continuous Mistakes One in three employees access work data from p

The number one cybersecurity startup on our list is Tanium, which raised over $190 million in 2015 for a new valuation of $3.7 billion, according to Pitchbook. A father-son duo, David and Orion Hindawi, founded the company and created its unique endpoint management system. At the latest valuation, they both became bill

The personal information of over three million Hello Kitty customers has been found online by security researchers. The database in question was found by security bod Chris Vickery and relates to the Japanese cartoon character’s online community, although those who registered accounts through hellokitty

Google has confirmed that it's testing a password-free way to sign into a Google account. The approach allows users to authenticate by responding to a notification sent to their smartphones. It's no secret that passwords are the weak link when it comes to account security, with poor hygiene, credentials theft and hack

Twittor Twittor is a stealthy Python based backdoor that uses Twitter (Direct Messages) as a command and control server. Setup For this to work you need: A Twitter account (Use a dedicated account! Do not use your personal one!) Register an app on Twitter with Read, write, and direct messages Access levels. Install

Anonymous has admitted responsibility for a huge 40Gbps DDoS attack that took place last week on Turkish DNS Servers because Turkey is supposedly supporting ISIS/ISIL (otherwise known as Daesh). Anonymous claimed in its video to Turkey that the attack on the servers was part of their ongoing efforts to put an end to D