vulnerability
Data Breach stories for this day
1.) Three million Google Chrome UK users are vulnerable to hackers-A research conducted by a cybersecurity consultancy firm named ‘Surecloud’ has discovered that all 3 million Google Chrome users in the UK and 30 million Chrome users on a global note are vulnerable to hackers. Experts suggest that the security flaw could make hackers steal […]
WhatsApp users should be aware of this Cyber Security Vulnerability
All those who are using WhatsApp, you better be aware of this new cybersecurity threat related to WhatsApp. It’s said that a bug in the said messaging app allows hackers to infiltrate into their WhatsApp app and send messages and group chats to near and dear ones without your knowledge. And if this flaw can […]
LTE data transmission is vulnerable to hackers
Researchers have found few mobile security loopholes in the data transmission of LTE networks aka 4G networks. Experts say that the vulnerability identified recently is found to affect almost all mobile phones and tablets connected to 4G networks. And the weakness could also spread to the upcoming mobile telephony standard 5G. Mobile security researchers from […]
Shallow Defense In Depth
Are More Security Controls Really Making You More Secure? The average enterprise uses 75 security products just to secure their network. Organizations mistakenly believe that layered security controls help them achieve a defense-in-depth strategy that will keep their systems safe. They think that when an attack breaches one control, another one will certainly fend off […]
Windows 10’s Controlled Folder Access Won’t Protect Your Data
What is Controlled Folder Access? With the release of Windows 10 Fall Creators Update, Microsoft added a new feature called Controlled Folder Access (CFA) to Windows Defender Exploit Guard. This features allows users to control which processes can access certain folders to help protect data from malicious programs, such as ransomware or wipers. CFA is […]
Case study: CloudPassage enables security for the Centrify DevOps team with vulnerability assessment and reporting, along with compliance reporting
This post was originally published here by casey pechan. We love our customers, especially when they make for the perfect case study! This was particularly true for Centrify, an Identity-as-a Service (IDaaS), enterprise mobility management and privileged access management solution that serves over 5,000 organizations worldwide. Being a security organization themselves, Centrify needed continuous visibility into […]
Popular Virtual Keyboard App leaks data from its 31 million Customers!
Popular Virtual keyboard App AI.type is facing the wrath of its users. As media reports emerged out that the developers of the app failed to secure database server containing the data of its respective users which is now vulnerable to hackers and dark web agents. Note- This app which can be used on Android and […]
DHS hacks into Trumps Airplane triggering a Cyber Threat alert!
All these days we witnessed hackers cyber attacking IT assets of small and big companies. But can anyone imagine cyber crooks hacking an airliner and taking the cockpit controls into their hands? And what if the jet airliner belongs to the 45th American President Donald Trump? Yes, you’ve read it right! The Department of Homeland […]
Twilio app vulnerability exposes data from over 180 million Smart Phone Users
All those who are using Twilio app are hereby alerted about a security error which has could have exposed data of more than 180 million smartphone users. Daily Mail reports that all calls and text messages of those using the Twilio app are now being intercepted by hackers who could post them on the dark […]
Smart Watches used by teenagers are vulnerable to Cyber Attacks
Consumer experts say that Smart Watches which are being used by Teenagers are at a risk of being cyber attacked due to some software related security flaws. They add that even high tech devices, costing $50 to $75 could be putting children in danger, especially those who are residing in the UK, Europe, and the […]