Still, more than a quarter of the SMB survey group said they lack the equipment and strategy needed to face a Ransomeware attack. What’s even more worrisome is that the fifth of the whole survey group said their company lacks proper preparation for a ransomware attack. The research is based on the survey, which was […]

Read More

Microsoft security researchers have warned users that even seemingly small Internet of Things (IoT) devices like LED light control consoles can be used to exploit our security systems by launching malware. Taiwan IoT Device Attack The evidence for this threat comes from an incident that happened in Taiwan. An IoT device was used to spew […]

Read More

Since mid-February, the National Cybersecurity Agency of the UK has targeted and eradicated more than 2,000 scams. Such a high number of cases targeted by an arm of the GHCQ Intelligence Agency of the UK in a single month is evidence that cyber attackers are leaving no measures to spread COVID-19 fear and panic among […]

Read More

Some of the lures are not particularly original but can easily fool some of the users. For example, an email that welcomes the users to their new zoom account and requests them to click on the link to activate their account can be a phishing attack. Similarly, phishing attackers are also sending an email which […]

Read More

A spokesperson for ZOOM has told the trusted resources that despite the company’s claim of providing end-to-end encryption, the company cannot provide end-to-end encryption for video conferences. The spokesperson also revealed that the encryption used by the ZOOM transports layer service, which encrypts the data between the user and the ZOOM’s server while end-to-end refers […]

Read More

10 Most Common Website Vulnerabilities

  • admin
  • March 30, 2023
  • 3 min read

Here are some of the most common website vulnerabilities: Injection flaws occur due to the filtering of untrusted inputs. It can happen when you pass unfiltered data to the SQL Server (SQL Injections), or anywhere else. The main vulnerability is that the attacker can inject commands in these entities, and as a result, there can […]

Read More

There has been an increase in the usage of video messaging apps. The new trend of video messaging is not so concealed, and the hackers have taken notice of the popular trend. They are trying to exploit user data privacy by sending us phishing emails, social media scam messages, and even text messages with fake […]

Read More

The popularity of the trend of Bringing Your Own Device (BYOD) is making mobile phones a high-risk vector for threats and phishing attacks. The vulnerability of mobile phone devices to cyberattacks arises from the vague security policies, relatively weak protection, and lack of full-time VPN tunneling. Security Report Here are some statistics from a trusted […]

Read More

A cybersecurity company in Singapore found a dump that contained approximately 400,000 payment card records on the dark web. The records were related to banks and financial organizations based in South Korea and the US. It is also the most significant sales record of South Korea on the dark web in 2020. The incident has […]

Read More

Apple Users Face Severe Text Bomb Device Crashing

  • admin
  • March 30, 2023
  • 2 min read

The problem occurs when your mobile device tries to display a message notification. If users have configured their iPhone to view a new message notification, which also includes a preview of the message, the iOS fails to render characters correctly, and the system crashes with uncertain results. The only way to get away from this […]

Read More