Sony closes backdoors in IPELA security cameras – but why were they open in the first place? Source: Sophos
Sony closes backdoors in IPELA security cameras – but why were they open in the first place? Source: Sophos
It’s very easy to write off any instant messaging app that isn’t Whatsapp as a clone of the famous messaging giant. How could anyone possibly take on the might of the Whatsapp –recently ranked as the best messaging app in the world for secure communication- behemoth? Well, WeChat, a China-based messaging app has an active […]
Download the PDF Introduction In 2016, ransomware continued its rampage across the world, tightening its hold on data and devices, and on individuals and businesses. The numbers speak for themselves: 62 new ransomware families made their appearance. There was an 11-fold increase in the number of ransomware modifications: from 2,900 new modifications in January/March, to […]
The current digital economy revolves around data. Giving up our data is the price we pay for signing up for free internet services, as the companies who provide these services use this personal information in order to fine-tune ads paid for by their true clients: advertisers. Data is the Internet’s oil. Unlike this limited fossil […]
Watch your favorite shows anywhere, and other useful VPN functions In simple terms, a VPN, or Virtual Private Network, is a connection between a group of discrete networks that exchanges encrypted data between your computer and a distant server. Sounds like boring technical jargon? Well, VPN’s can actually be used to perform some pretty neat […]
There’s been a lot of talk recently about DDoS (distributed denial-of-service) attacks in the wake of an incident that left thousands of users without internet access as a result of the collapse of the servers at Dyn, a DNS hosting service. Needless to say, we should be aware of this threat, know how it works, […]
Our guest article Righard has been in the IT security world since the late 80’s, and “playing” with computers since the 70’s. 1- At the beginning, computer viruses were almost like a myth. However, over the years, computer attacks became real and they have evolved significantly, along with security solutions. To what extent are we […]
Security researchers have discovered that two of the world’s most popular mobile dating apps can be hacked, exposing sensitive user data in the process. The team from the University of South Australia ran a series of tests, proving that a number of personal details could be extracted from the apps relatively easily. Capturing network traffic […]
The cyber-attacks on the backbone of today’s economies are materialized in those assaults that affect society as a whole. The strategic priorities of national security include infrastructure exposed to the threats that can affect the operation of essential services. PandaLabs, Panda Security’s anti-malware laboratory, has released a whitepaper called “Critical Infrastructure: Cyber- attacks on the backbone […]