Search Results for: Eavesdropping Blog Post Department of Interior Penetration Test October 2, 2020 IT systems of the governmental institutions are vital elements required to maintain smooth operations of a state or a country.... Blog Post Working from home? Switch off Amazon’s Alexa (say lawyers) March 26, 2020 The outbreak of COVID-19 disrupted modern working life and brings us a new working style: Remote working. However, working from... Blog Post Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many... Blog Post Wardrivers Can Crack Wi-Fi Passwords In Alarming Experiment January 17, 2022 Recent research has ruled that an attacker equipped with a basic, affordable set of wardriver gears can enter almost three-quarters... Blog Post ZoomBombing?! How Can You Protect Your Zoom Meeting from Attackers? March 31, 2020 During the epidemic, many people used video conferencing programs to communicate with friends and relatives or assist with Work From... Blog Post Honeypots & Honeynets April 23, 2020 Because of the increasing complex evasion techniques and protocols with encryption technology for preventing eavesdropping, intrusion detection systems provide less... Blog Post Voice Assistants Allow Outsiders Access to Camera? November 21, 2019 In July, both Google and Samsung released the patch for fixing the voice assistant flaws. These flaws allow hackers to... Blog Post Types of Password Attacks April 27, 2020 In the world of the internet, millions of User accounts are created every day and so are their passwords, being... Blog Post Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to... Blog Post Zero Trust Security- Report 2019 March 27, 2020 In a time where network surveillance is ubiquitous, we find ourselves having a hard time knowing who to trust. Can... Blog Post What are Technology Controls? April 22, 2020 Technology controls can also be known as a procedure or policy that provides a reasonable assurance that the information technology... Blog Post Multiple Consumer Linksys Router Models are Vulnerable to Attacks April 21, 2017 Two security researchers have discovered two dozen Linksys router models that contain at least 10 vulnerabilities between them, open to... Blog Post NSA Ethical Hackers are Reportedly Quitting in Droves March 1, 2017 The NSA is seeing an increased number of employed hackers and cyberespionage agents quitting the agency, according to current and... Blog Post Apple Backtracks on 2017 Mandate for HTTPS-Only Apps December 23, 2016 Apple issued a mandate during its 2016 WorldWide Developer Conference, requiring developers of all iOS and OS X applications in... Blog Post NSA Chief Hacker Reveals How He Can Be Kept Away – Part 1 February 1, 2016 The National Security Agency’s hacking chief reveals insights and tips to block the world’s best hackers. Here’ how NSA’s hacker-in-chief...
Blog Post Department of Interior Penetration Test October 2, 2020 IT systems of the governmental institutions are vital elements required to maintain smooth operations of a state or a country....
Blog Post Working from home? Switch off Amazon’s Alexa (say lawyers) March 26, 2020 The outbreak of COVID-19 disrupted modern working life and brings us a new working style: Remote working. However, working from...
Blog Post Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many...
Blog Post Wardrivers Can Crack Wi-Fi Passwords In Alarming Experiment January 17, 2022 Recent research has ruled that an attacker equipped with a basic, affordable set of wardriver gears can enter almost three-quarters...
Blog Post ZoomBombing?! How Can You Protect Your Zoom Meeting from Attackers? March 31, 2020 During the epidemic, many people used video conferencing programs to communicate with friends and relatives or assist with Work From...
Blog Post Honeypots & Honeynets April 23, 2020 Because of the increasing complex evasion techniques and protocols with encryption technology for preventing eavesdropping, intrusion detection systems provide less...
Blog Post Voice Assistants Allow Outsiders Access to Camera? November 21, 2019 In July, both Google and Samsung released the patch for fixing the voice assistant flaws. These flaws allow hackers to...
Blog Post Types of Password Attacks April 27, 2020 In the world of the internet, millions of User accounts are created every day and so are their passwords, being...
Blog Post Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to...
Blog Post Zero Trust Security- Report 2019 March 27, 2020 In a time where network surveillance is ubiquitous, we find ourselves having a hard time knowing who to trust. Can...
Blog Post What are Technology Controls? April 22, 2020 Technology controls can also be known as a procedure or policy that provides a reasonable assurance that the information technology...
Blog Post Multiple Consumer Linksys Router Models are Vulnerable to Attacks April 21, 2017 Two security researchers have discovered two dozen Linksys router models that contain at least 10 vulnerabilities between them, open to...
Blog Post NSA Ethical Hackers are Reportedly Quitting in Droves March 1, 2017 The NSA is seeing an increased number of employed hackers and cyberespionage agents quitting the agency, according to current and...
Blog Post Apple Backtracks on 2017 Mandate for HTTPS-Only Apps December 23, 2016 Apple issued a mandate during its 2016 WorldWide Developer Conference, requiring developers of all iOS and OS X applications in...
Blog Post NSA Chief Hacker Reveals How He Can Be Kept Away – Part 1 February 1, 2016 The National Security Agency’s hacking chief reveals insights and tips to block the world’s best hackers. Here’ how NSA’s hacker-in-chief...