Wi-Fi security flaw: WPA2 Key Reinstallation Attack KRACK
Security scientists have found a few key administration vulnerabilities in the center of Wi-Fi Protected Access II (WPA2) protocol that could enable an malicious...
BlackHat: Linux Kernel Hidden Inside Windows 10
Initially known as "Project Astoria" and delivered in beta builds of Windows 10 Threshold 2 for Mobile, Microsoft implemented a full blown Linux 3.4...
IoT to Create Target Rich Environment for Cyber Attacks
Internet of Things is rapidly growing, while many new technologies are being invented to assure comfort for human life. But, with billions of new...
A Critical Vulnerability in Inteno Routers
Security researchers are warning users regarding new critical vulnerabilities in Inteno routers, which could allow remote attackers to replace the firmware on a device...
4 Best Port Scanners
Port scanners are the application that scans server or host for available ports that are used for communication. These applications are often used by...
Offensive Network Security Framework
This git stream is considered a live and unstable build. All stable entries are committed into a release package.
Fully manages system states automatically for...
Australia’s Tier-3 launches Huntsman Security in the US to provide Security Systems
An Australian IT security company, Tier-3 has announced to enter the U.S. market Thursday with a plan to both disrupt and complement established security...
93 Percent of U.S Enterprises feels Vulnerable
A report revealed that around 93% of the major Enterprises in the U.S feels Vulnerable after seeing some major security breaches last year. The...
Over 12 Million Routers are Exposed to Critical hijacking Hack
More than 12 million routers in homes and small offices are vulnerable to attacks that allow hackers anywhere in the world to monitor user...
Google releases ‘nogotofail’ A Network Traffic Security Testing Tool
Google has released Nogotofail as an
open source project available on GitHub, meaning anyone can use it,
contribute new features, provide support for more platforms, and...
OWASP NINJA PingU – Not Just A Ping Utility
P { margin-bottom: 0.08in; }H2 { margin-bottom: 0.08in; }H2.western { font-family: "Liberation Sans",sans-serif; font-size: 14pt; font-style: italic; }H2.cjk { font-family: "Droid Sans"; font-size: 14pt;...
Top 10 Firewall for Mac
Every Macintosh device has built-in firewall. A provision
that can be constructed to outlaw information from accessing your Mac. This
transmission and receiving of data will...
Most Read
What Makes ICS/OT Infrastructure Vulnerable?
Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...
Everything You Must Know About IT/OT Convergence
What is an Operational Technology (OT)?
Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...
Understand the OT Security and Its Importance
This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...
What is Deepfake, and how does it Affect Cybersecurity?
Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...