perm_phone_msgUNDER ATTACK? S.O.S. LINE 0114 354 0054

Top Categories

Spotlight

today03/12/2021

Cyber security TechRepublic

How well do you know your APIs? Not well enough, says Cisco

Many APIs are openly accessible online, and that means big chunks of your apps are, too. Cisco’s Vijoy Pandey has tools and tips to help businesses get visibility into their APIs. Image: Shutterstock/Den Rise There’s a slight problem in the world of app development, and it’s one that’s pretty fundamental [...]

Top Voted
Sorry, there is nothing for the moment.

Month: August 2020

151 Results / Page 3 of 17

Background

today27/08/2020

  • 4
close

Cyber security The Register

DDoS downs New Zealand stock exchange for third consecutive day

New Zealand’s stock exchange (NZX) has closed for a third day thanks to a distributed denial-of-service (DDoS) attack. The exact nature of the incident is not known: an NZX spokesperson told The Register that “network connectivity issues relating to DDoS cybersecurity attacks” were behind the decision to close the market ...

today26/08/2020

  • 2
close

Cyber security The Register

Here’s a neat exploit to trick someone into inadvertently emailing their files to you from their Mac, iPhone via Safari

Pawel Wylecial, a security consultant with Redteam.pl, has published a proof-of-concept exploit for stealing files from iOS and macOS devices via web application code that utilizes the Web Share API. The security flaw, which isn’t too scary as it requires some user interaction, has not yet been repaired, though a ...

today26/08/2020

  • 6
close

Cyber security The Register

Researchers shine light on hackers-for-hire op that hit estate agent with malicious plugin for Autodesk 3ds Max

A hacker crew targeted a luxury estate agency involved in multimillion-pound property deals by deploying malicious plugins for 3D design software Autodesk 3ds Max as part of a potential hacks-for-hire operation. The unnamed company was targeted by the criminals in what infosec firm Bitdefender called a “sophisticated APT-style cyberespionage attack”. ...

today26/08/2020

  • 8
close

Cyber security TechRepublic

Cybersecurity at a crossroads: Moving toward trust in our technologies

Cloud computing changed the technology landscape forever. Here’s hoping that trust will be the next frontier of computing. Image: z_wei, Getty Images/iStockphoto More about cybersecurity We’ve had a rather amazing decade or two in computing. Some elements of this evolution were predicted, like ever-increasing processor speeds combined with declining costs, ...

today25/08/2020

  • 3
close

Cyber security TechRepublic

How phishing attacks have exploited Amazon Web Services accounts

Phishing campaigns could compromise business data and use Amazon’s cloud platform to launch further attacks, says KnowBe4. Getty Images/iStockphoto Amazon is a target ripe for exploitation in phishing campaigns because the company has such a huge presence across so many different areas. Most phishing emails that impersonate Amazon are aimed ...

today25/08/2020

  • 6
close

Cyber security The Register

Impersonating users of ‘protest’ app Bridgefy was as simple as sniffing Bluetooth handshakes for identifiers

An instant messaging app whose creators promoted it as secure and end-to-end encrypted was in fact no such thing, according to researchers at Royal Holloway. The University of London college found, according to a paper it published yesterday, that the app “permits its users to be tracked, offers no authenticity, ...

Designed by Cloud Boffins