Some of the Worst Passwords of 2019
Cybersecurity experts always advocate for a strong and unique password, and it is one of their top priority. They also continually identify the different patterns that make a strong, unique password. However, not many take this recommendation seriously, because they think it is difficult to remember or they are not able to come up with
- Martinez Athena
- 0
- Privacy
- 0
- 14.4K
Bodybuilding.com Data Breach, A Year After A Phishing Attack
There are times, that the bad effects of a phishing attack are not immediately felt. The phishers usually run many parallel campaigns all at the same time, and due to volume may take a while for them to “schedule” a “follow-up” attack against a target after a successful phishing expedition. This what happened when bodybuilding.com,
[ Read More ]jQuery JavaScript Library, Target Of Pollution Attacks
We can safely say that the Internet and the World Wide Web today will not be possible without the use of a scripting language that most people often overlook, Javascript. Whether we like it or not, JavaScript made the web as interactive, usable and convenient to use, in fact disabling scripting will break the functionality
[ Read More ]Is China Racial-Profiling Its Minority?
Mainland China has already started its massive facial database of all mainland Chinese citizens and possibly permanent residents of the country as well. Beijing is keen on monitoring the movements of people in the mainland. This is the key to transform China into a cohesive unit, with the opposition to the ruling leaders in Beijing
[ Read More ]Minnesota’s Department of Human Service, Latest Victim Of Phishing
Minnesota’s Department of Human Services (DHS) headed by its Commissioner Tony Lourey has issued a document to both houses of Congress detailing its data breach happened with the department affecting 11,000 people. It only took the hackers to persuade a DHS employee in opening an “invoice” email, and the department normally receives 92,500 phishing/spam emails
[ Read More ]Triton Hacker Group Attacks Saudi Petrochemical Company Again
FireEye, a mainstream cybersecurity consulting firm has recently exposed that a state-funded malware development group was behind an attempt to blow a Saudi-based Petrochemical facility using malware a second time. Called the “Triton” group, they have developed the eponymous malware, it takes control of machinery in order to overwork itself with the chance of eventual
[ Read More ]Firm’s Convenience VS Security, A Free Choice
As we have emphasized in this website many times in the past, security and convenience are two opposing principles when it comes to the digital lifestyle of an individual or a business entity. Each time convenience becomes the focus for an entity, the natural side-effect of a wider attack surface is the result. The measure
[ Read More ]7 Easy Steps To Secure Your Drupal Website
Let’s hope that all the Drupal website is updated and patched, and in that case, all the critical security flaw, Drupalgeddon2, is not likely to return. Even so, with the craze of cryptocurrency mining attack still lurking around the unpatched websites, here is a quick way to secure Drupal? Here is a list of 7 basic steps
[ Read More ]Is Infrastructure-As-A-Service The Future Of Corporate Computing?
Ask any system administrator today, and we will hear from them that attempts from unknown outside parties infiltrating their systems are happening on a daily basis. Yes, guys welcome to the 21st-century corporate computing era. We live in a world where cyber warfare is raging globally, between nations, between firms and between groups and individuals.
[ Read More ]VPN Apps Not Working As Intended, Exposed
As an IT professional for decades, we are always highlighting the importance of VPN when it comes to maintaining security and privacy. It is the most cost-effective way to isolate a connection from prying eyes, a VPN creates a secure virtual pipe from the user’s origin device to the VPN vendor’s exit node, wherever it
[ Read More ]