Researchers have discovered a security flaw in macOS, Linux, and several other operating systems that could let attackers hijack a wide range of virtual private network (VPN) connections. The bug, discovered by University of New Mexico researchers William J Tolley, Beau Kujath,… Read More ›
Cyber Security
Worth Reading: How to Secure Today's Online Kids?
Abstract The number of ways children today can go online and interact with others is staggering. From new social media apps and games to schools issuing Chromebooks, kids’ social lives and futures depend on their ability to make the most… Read More ›
CloudSecurity: Basic practices to help secure your AWS resources
After you create your first AWS account, you might be tempted to start immediately addressing the issue that brought you to AWS. For example, you might set up your first website, spin up a virtual server, or create your first… Read More ›
Virtual Private Networks (VPNs)
You may find yourself needing to use public Wi-Fi for Internet access when you are away from home, such as when you are at your local restaurant or coffee shop, or when you are traveling at a hotel or airport…. Read More ›
Shopping Security: 5 ways to take the worries out of holiday cyber shopping
Abstract For the first time ever, a majority of Americans plan do most of their holiday shopping online. But that doesn’t mean they’ve abandoned their worries about cyber shopping. A recent F-Secure survey found that most shoppers in the U.S. have serious… Read More ›
Russian Targeting US Energy and Other Critical Infrastructure Sectors
The Department of Homeland Security and the FBI issued a joint alert last week: Russian government cyber actors” have been targeting U.S. critical infrastructure sectors, including energy, nuclear and commercial facilities, since at least March 2016. This alert isn’t for any other… Read More ›
CyberSecurity:Anatomy of Social engineering attack
Below snapshot elaborates how hackers use social engineering attacks by tricking victims and achieved their deadly intentions. Nowadays it is not surprising for anyone if he/she gets a call from unknown sources. for instance salesperson, marketing and insurance agents. We… Read More ›