news

14
Sep
Seven tips you can follow to protect your WhatsApp account from hackers

1. End-to-end encryption All WhatsApp users should ensure that their chats are end-to-end encrypted. To verify that a chat is end-to-end encrypted, open the chat, tap on the name of the contact to open the contact info screen, and then tap Encryption to view the QR code and 60-digit number. WhatsApp end-to-end encryption ensures that […]

Posted in: Blog,
03
Aug
TrickBot Anchor Malware Infects Both Linux and Windows Systems

TrickBot, a multi-purpose Windows malware, has evolved as one of the reliable backdoor for several other payloads. recently, a researcher found that TrickBot’s Anchor malware is now present with a new Linux version. TrickBot Anchor_Linux malware Named as Anchor_Linux, the malware carries a Windows executable designed to infect both Linux and Windows systems on the same […]

Posted in: News,
24
Jul
2019 IT Skills and Salary Report

Introduction Welcome to the Global Knowledge 2019 IT Skills and Salary Report. It is the largest worldwide study of professionals in the technology community and has been conducted annually for over a decade. Throughout the report, you’ll find the data broken up by region: North America; Latin America; Europe, the Middle East and Africa (EMEA); […]

Posted in: Blog,
13
Jul
Critical Flaw Disclosed in Zoom Software for Windows 7 or Earlier

A zero-day vulnerability has been discovered in Zoom video conferencing software for Windows that could allow an attacker to execute arbitrary code on a victim’s computer running Microsoft Windows 7 or older. To successfully exploit the zoom vulnerability, all an attacker needs to do is tricking a Zoom user into performing some typical action like […]

Posted in: News,
06
Jul
Malicious Android Apps Stole Facebook Credentials

Researchers caught a bunch of dubious apps preying on Android users. This time, malicious Android apps stole Facebook credentials. The apps potentially affected millions of users. They found numerous apps on Google Play Store that targeted Android users with malware. Specifically, these malicious apps stole Facebook credentials of Android users and revealed that they found […]

Posted in: News,
06
Jul
Malicious Android Apps Stole Facebook Credentials

Researchers caught a bunch of dubious apps preying on Android users. This time, malicious Android apps stole Facebook credentials. The apps potentially affected millions of users. Researchers from a French cybersecurity firm Evina found numerous apps on Google Play Store that targeted Android users with malware. Specifically, these malicious apps stole Facebook credentials of Android […]

Posted in: News,
29
Jun
Twitter Admits Business Data Breach For Some Users and Conveys Apologies

Twitter has made it to the news due to a cyber security incident. This time, Twitter has apologized to its business users due to a personal data breach. Twitter has admitted a data breach involving personal information of some of its business clients. The incident surfaced online after Twitter sent emails to the affected users […]

Posted in: News,
22
Jun
106 New Chrome Browser Extensions Caught Spying On Users

Google recently removed 106 more extensions from its Chrome Web Store after they were found illegally collecting sensitive user data as part of a “massive global surveillance campaign” targeting oil and gas, finance, and healthcare sectors. However, it’s not immediately clear who is behind the spyware effort. “This campaign and the Chrome extensions involved performed […]

Posted in: News,
15
Jun
Millions Of Malicious Android Apps On Play Store Barraged Users With Ads

38 different Android apps committing ad fraud. These apps included beauty camera and photo editing applications as well. In all, the apps boasted a whopping 20 million downloads altogether. Describing the types of frauds committed by the apps, there are three different types. Out-of-Context (OOC) Ads: That is, showed ads to the users sourced from […]

Posted in: News,
10
Jun
Microsoft Has Released Patches For 129 Vulnerabilities In The Largest Update Ever

Microsoft released patches for 129 CVEs covering Microsoft Windows, Internet Explorer (IE), Microsoft Edge (EdgeHTML-based and Chromium-based in IE Mode), ChakraCore, Office and Microsoft Office Services and Web Apps, Windows Defender, Microsoft Dynamics, Visual Studio, Azure DevOps, and Microsoft Apps for Android . SMBv3 Flaws Trio of fixes stuck out in the Patch updates, for […]

Posted in: News,
08
Jun
Security Flaws In Zoom Can Allow Hijacking Users Systems

Zoom Security Flaws Allowed Systems Hijacking Security researchers  have caught a couple of security flaws in Zoom that allowed systems hijacking. As stated in their advisory, both of these were path traversal vulnerabilities that allowed an adversary to hack users’ systems via Zoom chats. The first of these bugs, CVE-2020-6109 existed in the way the […]

Posted in: News,
01
Jun
A New Scanner Malware Poisoning NetBeans Projects on Github

The security of the open-source supply chain is about the integrity of the entire software development and delivery ecosystem. A self-spreading and OSS supply chain malware was found abusing Github repositories. What has happened On March 9, 2020, GitHub’s Security Incident Response Team (SIRT) received its initial notification about a set of repositories that were actively serving […]

Posted in: News,
23
May
Millions Of Devices Are Exposed To Hackers By New Bluetooth Vulnerability

Academics disclosed a security vulnerability in Bluetooth that could potentially allow an attacker to spoof a remotely paired device, exposing over a billion of modern devices to hackers. The attacks, dubbed Bluetooth Impersonation AttackS or BIAS, concern Bluetooth Classic, which supports Basic Rate (BR) and Enhanced Data Rate (EDR) for wireless data transfer between devices. “The Bluetooth specification […]

Posted in: News,
16
May
DDoS Attacks Were Conducted By Malicious Android App On ESET Website

ESET researcher Lukas Stefanko revealed details about an Android app that targeted the ESET website with DDoS attacks. Briefly, the app dubbed as “Updates for Android” appeared on the Play Store as a news update app. It linked back to the website i-updater[.]com that looked promoted the app. It apparently looked and remained pretty harmless, […]

Posted in: News,
04
May
‘Vaccines’ That Containing Recovered COVID-19 Patients Blood Are for Sale on Dark Web

Fraudsters are attempting to sell fake vaccines allegedly manufactured using the blood of patients who have recovered from COVID-19. The nonsense vaccines were among a crock of utter dog wings spotted for sale on the dark web by researchers from the Australian National University’s Cybercrime Observatory. Researchers were trawling dark net markets for coronavirus-related medical […]

Posted in: News,
27
Apr
Facebook take measures to limit Covid-19 misinformation

While the ongoing COVID-19 pandemic is already quite dreary, what makes it even worse is the dissemination of fake news. People have flooded Facebook and Twitter with treatments, remedies, news, and stats regarding COVID-19 without checking their authenticity. Consequently, the flurry of fake news and misinformation is contributing towards the rise in panic among the […]

Posted in: News,
25
Apr
iPhone at highly risk of hacking through email application

A flaw in Apple’s mobile operating system may have left millions of iPhone and iPad users vulnerable to hackers. A mobile security firm, said a bug in the Mail app made devices susceptible to sophisticated attacks. The firm said it had “high confidence” the bug has been used to exploited at least six high-profile victims. […]

Posted in: News,
20
Apr
How Lockdown Has Made a Way For VPN Hackers

NordVPN claimed that the usage of their services increased by 165% globally. Adversaries fake apps’ reviews to rank their apps so that they can get maximum downloads. It is indeed true that the world will not be the same place post-pandemic. A novel virus that has kept us contained in our homes has gravely impacted […]

Posted in: News,
14
Apr
Shady Android VPN Application That Allowed MiTM Attacks Is Removed By Google

Google have recently removed a shady Android VPN App from the Play Store. Identified as SuperVPN Free VPN Client, this app boasted 100 million installs and had vulnerabilities allowing for MiTM attacks. SuperVPN Free VPN Client Bugs A couple of months ago, researchers from VPNpro shared a detailed study about various VPN apps on the […]

Posted in: News,
06
Apr
Reasons Why You Should Choose a Career in Cyber Security

We live in a digital age! From searching even the tiniest piece of information to ordering food and other services online; we’re totally dependent on technology. Living in a digital era also means that hackers have numerous opportunities to exploit government institutes, individuals and organizations around us. To combat security breaches and cyber attacks, companies […]

Posted in: Blog,
Tags: Cyber Security, cyber security training, cyber security training online,
05
Apr
A Bug From Twitter Allowed Firefox To Store Cached Files Shared Via Direct Messages

Twitter has recently disclosed a vulnerability that indirectly affected users’ privacy. As disclosed, this Twitter bug allowed a browser to store cached files, including the private ones. Twitter Bug Left Cached Files Stored Twitter has disclosed a bug impacting some users’ privacy. This bug allowed browsers to store cached files, including private data shared via […]

Posted in: News,
04
Apr
Ethical Hacking Training Course Online- Tips on Choosing The Right Course

Almost all of us have a general notion of which field we want to pursue our careers in. However, selecting the best course that can provide you with excellent job prospects is daunting. If you are on this page and reading this, it is obvious what you are looking for- of course, a brilliant future […]

Posted in: Blog,
Tags: Certified Ethical Hacker,
04
Apr
Helpful Guide for Certified Ethical Hacker Exam

Preparing for the CEH exam and need some helpful guidelines to do well? We’ve got you covered. In this blog, we will provide you with all the necessary information that will help you pass the exam with flying colours. With the importance of cyber security increasing rapidly, cracking the certified ethical hacker exam is not […]

Posted in: Blog,
Tags: Ethical Hacking Certification, Ethical Hacking Certification Course,
30
Mar
VPNs Are Stopped by Unpatched iOS Vulnerability From Thorough Traffic Encryption

While Apple has built a credible stance regarding users’ privacy, a bug has recently made shown otherwise. As discovered, an unpatched vulnerability existed in recent iOS versions that stopped VPNs from entire traffic encryption. Hence, it triggered the possibilities of IP and information leak of those using VPNs. iOS Vulnerability Stops VPN Encryption Reportedly, ProtonVPN […]

Posted in: News,
28
Mar
Hackers Use Fake “Corona Antivirus” Software to Distribute Malware Backdoor

Security experts have reported two such sites where this software could be found. It comes with bot management features including restarting and shutting down an infected device, updating bot client, and more. Researchers have discovered sites that are exploiting the current COVID-19 pandemic to target computer systems using a fake “Corona Antivirus”. What happened? A […]

Posted in: News,
20
Mar
Social Engineering Penetration Testing – Methods and Steps

If you’ve read our previous blog, you may be aware of what social engineering penetration testing is. But if you haven’t, we advise that you give a quick read to that blog here. There are three main methods used to perform a social engineering attack including information gathering, victim selection, and engagement with victims. Information […]

Posted in: Blog,
Tags: Certified Ethical Hacker Course, Social Engineering, Social engineering penetration tests,
16
Mar
Slack Addresses Potential Account Takeover Bug

There was a big threat to shared private data, channels, and conversation leak from the Slack platform. Slack addressed a critical flaw within 24 hours from its disclosure. A bug bounty hunter discovered a critical vulnerability in Slack, the popular team communication platform, that could have allowed cybercriminals to launch automated account takeover attacks. What […]

Posted in: News,
12
Mar
A Complete Guide to Social Engineering Penetration Testing

While there are various methods to perform a penetration test, we are specifically going to talk about social engineering penetration testing in this blog. With the increasing dependency on the internet and the use of social media, social engineering has become pretty common. It is a cyber security attack wherein the attacker tricks individuals into […]

Posted in: Blog,
Tags: cyber security certification courses online, Social Engineering Attacks, social engineering penetration testing,
09
Mar
All Intel CPUs That Released in Last 5 Years are Affected by Unpatchable Flaw

All Intel processors released in the past 5 years contain an unpatchable vulnerability that could allow hackers to compromise almost every hardware-enabled security technology that are otherwise designed to shield sensitive data of users even when a system gets compromised. The vulnerability, tracked as CVE-2019-0090, resides in the hard-coded firmware running on the ROM (“read-only memory”) […]

Posted in: News,
05
Mar
3 Major Benefits of a Certified Ethical Hacker Course

A Certified Ethical Hacker certification demonstrates a security expert’s ability and expertise related to penetration testing. It is one of the most famous and sought after training that allows you to achieve a specialist job in the IT security field. With a certified ethical hacker certification, an individual acquires white-hat techniques. It also allows the […]

Posted in: Blog,
Tags: certified ethical hacking course, Ethical Hacking,
03
Mar
Importance of a Cyber Security Certification in 2020

We are already two months into the New Year and a lot has happened in these months. The last year, in particular, made businesses and individuals more aware of cyber security. In fact, it has now become the number one priority for varied businesses. More of our fundamental infrastructure is coming on the web and […]

Posted in: Blog,
Tags: Cyber Security, Cyber Security Certification, information security courses online,
02
Mar
Security Experts Warn Against Popular Phones and Losing Fingers to Criminals

Speaking at the RSA Conference in San Francisco, cybersecurity experts Aaron Turner and Georgia Weidman discussed two-factor authentication and biometrics as means to securing one’s phone. Although they concur that the two-factor authentication is the way to go, there are certain caveats. Authenticator apps like Google Authenticator generally provide better security than SMS-based schemes, however, they are […]

Posted in: News,
28
Feb
3.5M Unfilled Cybersecurity Jobs by 2021- Says Cybersecurity Ventures

Ever since the advent of the digital era, cybercrime has lifted to a greater extent. Further, with the advancement of technology, the tools present to hackers have become more advanced. So, it’s the biggest threat to everybody who is using the internet- be it an individual or an organization. It has become crucial to reinforce […]

Posted in: Blog,
Tags: Cyber Security, cyber security certifications, cyber security certifications online,
28
Feb
Cyber Security Certification: Salary and Career Outlook

A cyber security certification provides a multitude of career opportunities. Moreover, it is one of those fields that pay you really well. According to PayScale, the average salary of a cyber security expert in the US is about $96,000 per year. However, the salaries aren’t the same at all levels. The higher-level positions in this […]

Posted in: Blog,
Tags: Cyber Security, cyber security training course, cyber security training online, Online Certification Courses for Cyber Security,
25
Feb
A Step by Step Guide to help you build your career in Cyber Security within 3 to 6 months

350% growth in open cybersecurity positions from 2013 to 2021 The New York Times reports that a stunning statistic is reverberating in cyber security: Cyber security Ventures’ prediction that there will be 3.5 million unfilled cyber security jobs globally by 2021, up from one million positions in 2014. If you plan to build a career […]

Posted in: Blog,
Tags: Cyber Security, cyber security training, cyber security training course,
23
Feb
Google Prohibits 600 Android Apps from Play Store for Serving Disruptive Advertisements.

Google has prohibited nearly 600 Android apps from the Play Store for bombarding users with disruptive ads and violating its advertising guidelines. The company categorizes disruptive ads as “ads that are displayed to users in unexpected ways, including impairing or interfering with the usability of device functions,” such as a full-screen ad served when attempting […]

Posted in: News,
17
Feb
500 Chrome Extensions Caught Stealing Private Data of 1.7 Million Users

Google removed 500 malicious Chrome extensions from its Web Store after they found to inject malicious ads and siphon off user browsing data to servers under the control of attackers. These extensions were part of a malvertising and ad-fraud campaign that’s been operating at least since January 2019, although evidence points out the possibility that […]

Posted in: News,
14
Feb
7 Beneficial Online Certification Courses for Cyber Security

Technology has proved to be a double-edged sword, especially when it comes to cyberspace. Many organizations have realized this one step too late only to be faced with threats to their vital, private data. A vast number of businesses are still not prepared to deal with the threats that they face today, let alone the […]

Posted in: Blog,
Tags: Cyber Security, ethical hacking training, Online Certification Courses for Cyber Security,
09
Feb
Facebook’s Messenger Kids App to Allow Parents to Peer into Their Childs Inbox

Last year, Facebook’s Messenger Kids made it to the news due to serious security issues. This year, Messenger Kids is under the limelight, however, for a positive change. Facebook has recently announced changes in the Messenger Kids app features that empower parents to keep an eye on their kids. They have also updated their privacy […]

Posted in: News,
09
Feb
This WhatsApp Bug Could Have Let Attackers Access Files On Your PCs

A cybersecurity researcher today disclosed technical details of multiple high severity vulnerabilities he discovered in WhatsApp, which, if exploited, could have allowed remote attackers to compromise the security of billions of users in different ways. When combined together, the reported issues could have even enabled hackers to remotely steal files from the Windows or Mac […]

Posted in: News,
Open chat