Hacking

Zero-day vulnerability with file-deleting capability found in Windows 10

A security researcher unearthed a zero-day vulnerability in Microsoft Windows 10. And this one goes beyond altering system files – it actually deletes them.

Gemalto misreports 1.2 billion Aadhaar data breach; apologizes to UIDAI

Gemalto took a U-turn on its report of the Aadhaar data breach. Buckling under pressure from UIDAI, the security major has now issued an apology statement.

Attention enterprise network defenders: Burned malware returns

Burning malware forces attackers to evolve, not go away. Network defenders take note.

Kaspersky Cyberinsights 2018: Cybersecurity in the age of digital transformation

The Kaspersky Cyberinsights 2018 two city series in India, as part of its pan-APAC series, put the spotlight on the central theme of “Building Cyber Defence and Resilience with Adaptive Security Framework”. 

Quantum communication will make internet unhackable: Research

Purdue University research on quantum communication, supported by the U.S. Department of Energy can soon make internet communication hacking a thing of the past. 

Top IT security certifications

Boost your employability options with these top IT security certifications

Apple strongly denies Bloomberg’s Chinese hacking report

Bloomberg says Apple was one of many companies subject to an unprecedented state-sponsored hack, but Apple says its reporting is inaccurate.

“Everything is fine” vs. “we’re doomed” isn’t the way to frame election security

The extremes of despair and optimism are both dangerous to information security. What we need to do is calmly assess the threats.

Security experts hack unsuspecting family’s Amazon Echo

Online security experts vpnMentor have investigated the accessibility of Amazon Echo by hacking into one unsuspecting family’s device, highlighting how easily it could be tampered with.

What is Wireshark? What this essential troubleshooting tool does and how to use it

Wireshark is a must-have (and free) network protocol analyzer for any security professional or systems administrator. It's like Jaws, only for packets.

What is Magecart and was it behind the Ticketmaster and BA hacks?

The phenomenally damaging cyberattack on British Airways last week saw the haemorrhaging of information from over 385,000 transactions, credit card and personal details included.

Wanted: Data breach risk ratings, because not all breaches are equal

We need a system for data breaches that rates the real risk associated with the compromised data.