Hackers Can Use Unused Internet Explorer to Steal Data
This is no less than a shocker…Hackers can now use Internet Explorer to steal your data, that too even if you never use it. A security researcher has detected a zero-day vulnerability in Internet Explorer which would allow hackers to steal data. Security researcher John Page has published details and proof-of-concept code for the zero-day
[ Read More ]A Quick Glimpse Of Hong Kong’s Cybersecurity Readiness
The Hong Kong Special Administrative Region has governed under a One-China, Two-systems policy since 1997. That means the great firewall of China which is enforced in the mainland is not applied in Hong Kong. It decides on its own about its internal policies when it comes to governance, including the responsibility of making sure that
[ Read More ]Two UK Agencies Commit Accidental Contact Information Leaks
The United Kingdom is currently processing its Brexit documents to complete the process of leaving the European Union for good. But it is now at the very center of another controversy as 240 EU-member state nationals applying for EU settlement scheme program had their email addresses leaked from the UK Home Office due to an
[ Read More ]Android Phone as Physical Security Key for Google Accounts
Great news indeed! Google has come up with a new advanced two-factor authentication method that would help you secure your Google accounts using your Android phone as a physical security key. This new advanced two-factor authentication method secures Google accounts when users log in using the Chrome browser. This service can be used on Android
[ Read More ]The State Of BayState Health Data Breach
A huge phishing campaign has brought Baystate Health to losing an estimated 12,000 individual patient record, the Massachusetts-based healthcare provider disclosed. The affected information that was breached includes full name, birthdate, medical record, diagnostic record, health insurance details, and social security numbers. The records were breached from the period of February to March 2019, and
[ Read More ]4 Simple Tips to Fight PC Infections | Stay Protected from Threats
In today’s cybersecurity atmosphere, there is no way for any organization to assume that “we are not hacked”. The attack surface is very wide in Windows, Office, Java, Flash Player, and even the Intel processors have hardware security bugs. Basically, 2018 was a horrible year for cybersecurity because it proved how indefensible is the architecture
[ Read More ]Top 10 Misconceptions In Cybersecurity
Cybersecurity is a big word that is being used by IT professionals and the mainstream media nowadays, unfortunately, the latter still lack understanding on how to explain it to common people. There is a gap between how the cybersecurity vendor markets their products and services vs how the mainstream media handle the reports as if
[ Read More ]Android Q’s Deep Press, an iPhone 3d Touch Clone
We are in the day and age that both Android and iOS are both copying each other’s features, which is not a big deal given how both platforms are already in their maturity stage. Google has decided to silently implement a feature that resembles 3d touch in iPhones, they call it the “Deep Press”, which
[ Read More ]Why Are Web Hosting Servers Often Planted With Malware?
Ten nasty malware are currently having a field day infecting and using 10 corporate-level web hosting servers for further malware deployment to site visitors. The campaign which saw the progressive growth of Azorult, Gandcrab, Neutrino, Hermes, IcedID, Trickbot, Nymaim, Gootkit and Dridex in these 10 servers were linked to the Necurs botnet. It is a
[ Read More ]Apache Critical Vulnerability Discovered, Update Available For Download
Apache, the top web server platform the Internet as a critical vulnerability which is recently patched by Apache Foundation. Everyone that Apache needs to immediately install the patched version of Apache in order to close the vulnerability which is now known as CVE-2019-0211. As per the report affected versions range from 2.4.17 to 2.4.38, the
[ Read More ]