“Botnet” or “Zombie army” is a network of compromised computers which can communicate with each other by giving third-party access to the computer without the admin’s knowledge. Each infected computer is called “Bot” or “Zombie.” IoT devices are also used in botnets. The one who controls the
Read more →So IoT is that buzzword used for prototyping, new technologies like ultra narrowband & updated machine2machine communication. There are a lot of good developments out there but there are also people, mainly consultants really comfortable with what they did. Resulting in cybersecurity disasters for operational technology. And
Read more →We’re pleased to be partnering with Cisco for this blog. Scroll down to download the Cisco 2018 Annual Cybersecurity Report Ask any cybersecurity professional and most will agree that a large percentage of modern technology was developed without a ‘security first’ mindset. That is, companies work to ship
Read more →#cryptocurrency Sure, everyone loves a funny cat video, but if you receive a video file (packed in zip archive) sent by someone through Facebook messenger, think twice before opening it. That video may just be a cryptocurrency mining bot. Discovered by researchers from security firm Trend Micro, this new
Read more →#emergencypatch Looks like someone took a bite out of Apple. The macOS High Sierra was discovered to contain a bug where anyone with physical access to a computer running the latest version could bypass the secure login simply by putting “root” in the username field. Developer Lemi
Read more →#wikileaks Just when the world thought Wikileaks might just stop dripping, the whistle-blower forum resumed their old ways, this time releasing source code and analysis of CIA hacking tools dubbed ‘Vault 8.’ You may recall that beginning in March of last year, Wikileaks began releasing formerly confidential CIA
Read more →Internet of things is currently one of the best technologies available to mankind. It is really helpful in reshaping the world and its future. Many Tech-giants are even moving into this field, whereas many start-ups are growing up making IoT their agenda. Everyone is thinking about making
Read more →#wikileaks Wikileaks is in the news for more reasons than 1 this week. As expected, they’ve added another hacking tool to the growing list of Vault 7 leaks. The latest, ‘AngelFire’ is a Windows hacking tool used to gain persistent remote access. But, prior to that leak,
Read more →The Internet of unsafe things, aka IoT (Internet of Things), will bring problems to many users of this unnecessary technology. I see the point of IoT in an industry, in production, medicine, etc. etc., it’s really good technology, and a revolutionary one, but to connect a coffee
Read more →