Author: C-YBER

shape
shape
shape
shape
shape
shape
shape
shape
Standard

Will streaming services pose increasing security threats?

Streaming services isn’t anything new. They’ve been around for quite some time. But over the past couple of years, the industry has seen some increasing competition. This has been largely due to the global corporations entering the market. Companies like Disney, Amazon, and even Apple want a big chunk of the market share. On the plus side, the increasing competition means that there will be more options and better-quality content. But this competition also means that these services may now offer a higher security risk as well.

Standard

Some of the most notable data breaches in history

Data breaches aren’t new. There’s a target painted on almost every system today. Particularly if that system contains valuable data in the millions. After all, data is the new oil. Among the many high-profile hacks that have happened over the last decade, here are some of the notable ones.

Standard

How secure are your Android smartphones?

Mobile devices can be highly insecure, particularly smartphones. Take Android for instance. When you buy an Android smartphone it’s rarely a pure Android experience. Manufacturers often try shipping smartphones with their own apps and services, or in other words, bloatware. But beyond the usual annoyance, these apps and services could be equipped with their own vulnerabilities. This essentially puts smartphones at risk prior to getting the devices to the users’ hands.

Standard

XSS Security hole in Gmail

Cross-site scripting or better known as XSS is a type of injection attack. This is where malicious scripts are injected into otherwise legitimate and trusted websites. Attackers use XSS to trick unsuspecting users. These forms of attacks come through to the user as web browsers can fail to identify malicious scripts. Particularly if they are from a seemingly trusted source. Usually, these attacks could access cookies, session tokens, or other browser-related sensitive information.

Standard

Secure Development Practices

Coding is at the heart of technology. It’s what built billion-dollar businesses and helped humans land a rocket on the moon. But it isn’t only about programming. It’s sometimes about how it’s coded as well. This is vital, particularly for security. Incorrect coding practices could lead to serious security flaws in systems.

Standard

So your website got hacked. Now what?

If it’s one thing that anybody would dread, it is to see their company website get hacked. But today, websites get hacked around the world on a daily basis. Hopefully, you’re not one of those unlucky souls to undergo this horror. But either way, what do you do if your website gets hacked? Here’s what you need to know.

Standard

What is Penetration testing?

It’s no secret that technology is advancing at a rapid pace. In today’s society technology has become an essential part of our daily lives. Part of this means that cybersecurity is also becoming a more crucial element in the modern environment. Now, there are many aspects of cybersecurity. Penetration testing, or pen testing, is one of them.

Standard

A glimpse into digital forensics

Digital forensics. Chances are, you’re more likely to picture a scene from a crime TV drama than cybersecurity. Although it stems from forensic science, digital forensics remains an important component of the field of cybersecurity. But how important is it for you?