Cybersecurity news and analysis

Activities in cyberspace during Four-day war (April, 2016). Attack April 2, 2016 Government & media The hacker group “MMCA” (formerly known as Monte Melkonian Cyber Army) targets DoS/DDoS attacks on Azerbaijan government and media websites: Gov.az Aze.az Apa.az Internet Service Providers The hacker group “MMCA”

Cloudflare, a multibillion-dollar startup that runs a popular content delivery network used by more than 5.5 million sites, accidentally leaked customers' sensitive information for months. Last Friday, Tavis Ormandy from Google’s Project Zero contacted Cloudflare to report a security problem (the flaw was dubbed Cloud

Pwnie Express released its yearly industry report: Internet of Evil Things, providing insight on products that the IT professionals should be wary of. Your browser does not support the video tag. According to Pwnie Express research: 66% don’t know or aren’t sure how many connected devices their colleagues bring

Who would win the battle for the White House to become the next President of the United States was a topic of hot debate in 2012. Much of that debate was taking place online, with plenty of people blogging, tweeting or updating social media with their thoughts on Mitt Romney versus Barack Obama. Photo: usatoday.com Th

I have read an interesting article in our partner's website recently about an employer who read the employee's messages to make sure she is not doing anything else rather than her regular job at the office. Photo: xervant.com In the article you will find detailed information about the legal aspects of such incident, s

Have you ever wondered how much is your email password worth? It depends what data are you trying to protect in electronic form using that password. John Brennan, Director of the Central Intelligence Agency (Photo: boingboing.net) Data security is a major issue for businesses and organizations today. That is why a gro

Symantec has detected up to 20,000 daily attempts to exploit a recently patched Joomla vulnerability that can be leveraged for remote code execution. Photo: www.tricountyweb.com The vulnerability, identified as CVE-2015-8562, was patched in mid-December with the release of Joomla 3.4.6 and hotfixes for versions 1.5 an

Passwords are a vital component used to access digital assets, that is why "Password Hygiene" is one of the highest priority requirements in large organizations. There are some common-sense guidelines that should be followed for a Good Password Hygiene to secure sensative data at work and in your pesonal lif

While education and efforts around online credentials are improving, password hygiene still has problems Image: Tested.com The Balance 60% of employees do work activities from a personal device 55% of employees do personal activities on work devices Continuous Mistakes One in three employees access work data from p

The number one cybersecurity startup on our list is Tanium, which raised over $190 million in 2015 for a new valuation of $3.7 billion, according to Pitchbook. A father-son duo, David and Orion Hindawi, founded the company and created its unique endpoint management system. At the latest valuation, they both became bill

The personal information of over three million Hello Kitty customers has been found online by security researchers. The database in question was found by security bod Chris Vickery and relates to the Japanese cartoon character’s online community sanriotown.com, although those who registered accounts through hellokitty

Google has confirmed that it's testing a password-free way to sign into a Google account. The approach allows users to authenticate by responding to a notification sent to their smartphones. It's no secret that passwords are the weak link when it comes to account security, with poor hygiene, credentials theft and hack

Twittor Twittor is a stealthy Python based backdoor that uses Twitter (Direct Messages) as a command and control server. Setup For this to work you need: A Twitter account (Use a dedicated account! Do not use your personal one!) Register an app on Twitter with Read, write, and direct messages Access levels. Install

Anonymous has admitted responsibility for a huge 40Gbps DDoS attack that took place last week on Turkish DNS Servers because Turkey is supposedly supporting ISIS/ISIL (otherwise known as Daesh). Anonymous claimed in its video to Turkey that the attack on the servers was part of their ongoing efforts to put an end to D