Cybersecurity

Are web browsers finally shifting their focus to security and privacy?

Are web browsers finally shifting their focus to security and privacy?

The web browser market has come a long way since the early days of Internet Explorer on Windows 95The likes of Google Chrome and Mozilla Firefox has grown almost exponentially over the years Today there are many flavors of web browsing one can experience But when it comes to security, not every browser falls in an equal placeSo, it is important to know what different web browsers are doing to tackle security and...

Read More →

What we should know about DDoS attacks?

What we should know about DDoS attacks?

By now most of aren’t strangers to cyber-attacks Even if you have never fallen victim you would have seen plenty of news surfing the digital space on how company systems get compromised each day Out of these attacks, Dos or DDoS is a regular term that keeps popping up What do these terms mean How does one protect themselves from these type of attacks Here’s what you need to know Before getting into DDoS, it...

Read More →

Is Zoom safe?

Is Zoom safe?

Following lockdowns and work from home protocols across the world, there’s one software that’s seen a boom in the past month Zoom reportedly grew X since XY But you probably knew that already After all, it was hard to avoid people posting screenshots of their zoom conversations all over social media As such, it should also come as no surprise that Zoom is raising some serious security...

Read More →

Hackers Created Thousands of Coronavirus (COVID-19) Related Sites As Bait

Hackers Created Thousands of Coronavirus (COVID-19) Related Sites As Bait

As the world comes to grips with the coronavirus pandemic, the situation has proven to be a blessing in disguise for threat actors, who've taken advantage of the opportunity to target victims with scams or malware campaigns Now, according to a new report published by Check Point Research today and shared with The Hacker News, hackers are exploiting the COVID-19 outbreak to spread their own infections,...

Read More →

7 Steps to Avoid Uncoordinated Vulnerability Disclosure

7 Steps to Avoid Uncoordinated Vulnerability Disclosure

Imagine the following situation You work as a security manager for a company that owns the website wwwexamplecom One day, your sales department receives an email from an unknown individual The sales department forwards it to you The email has the following content: You examplecom/loginphp page break Send XSS </script><img/%00/src="worksinchrome:prompt(1)"/%00/onerror=’eval(src)’><img/ src=`~`...

Read More →