New Attack on WPA/WPA2 Discovered, Most Modern Routers at Risk

A new attack on Wi-Fi protected access protocols has been discovered. The new technique to crack WPA PSK (Pre-Shared Key) passwords enables outside users to capture access credentials easily. The discovery of the attack was accidental – the Hashc… Continue reading New Attack on WPA/WPA2 Discovered, Most Modern Routers at Risk

CVE-2018-14773 Symfony Flaw Affects Drupal Versions 8.x-8.5.6

A new vulnerability has been discovered, CVE-2018-14773, that affects Drupal, the popular open-source content management system. More specifically, the vulnerability resides in a component of a third-party library called Symfony Http Foundation compone… Continue reading CVE-2018-14773 Symfony Flaw Affects Drupal Versions 8.x-8.5.6

Cisco to Acquire Duo Security for $2.35 Billion in Cash

Cisco just announced a big acquisition, in the size of $2.35 billion in cash. The company is acquiring cloud-based identity and access management solutions provider Duo Security. “Cisco (NASDAQ: CSCO) today announced its intent to acquire private… Continue reading Cisco to Acquire Duo Security for $2.35 Billion in Cash

CCleaner v5.45 Introduces Data Collection with No Way to Opt-Out

Last year, security researchers uncovered that the popular PC cleaner CCleaner was backdoored. Older versions of Piriform CCleaner -v5.33.6162 and CCleaner Cloud v1.07.3191- had been compromised, and as a result millions of users were affected. New Cha… Continue reading CCleaner v5.45 Introduces Data Collection with No Way to Opt-Out

Steam Alert: Abstractism Game Exploited Gamers’ CPU for Cryptomining

Numerous Steam users have reported that a game titled Abstractism is consuming way too much CPU power to mine for cryptocurrency. The game was also selling marketplace items that were masqueraded as goods from popular games such as Team Fortress…Read… Continue reading Steam Alert: Abstractism Game Exploited Gamers’ CPU for Cryptomining

Spam in 2018: Beware ZIP, .DOC, .XLS, .PDF, and .7Z File Attachments

New security statistics reveal that spam is one of the most common methods used to distribute malware to potential victims. Because of the high click rate, malicious email messages continue to be a preferred technique among cybercriminals. F-Secure res… Continue reading Spam in 2018: Beware ZIP, .DOC, .XLS, .PDF, and .7Z File Attachments

Ubuntu 18.04 Security Guide Helps Both Organizations and Home Users

Ubuntu 18.04 has been updated with a brand new security guidance released by the National Cyber Security Centre, a department of GCHQ (Government Communications Headquarters). More about the Ubuntu 18.04 Security Recommendations “It’s impor… Continue reading Ubuntu 18.04 Security Guide Helps Both Organizations and Home Users

One-of-a-Kind HP Printer Bug Bounty to Improve Network Security

Printers are often the weakest link in an organization, with printer vulnerabilities being exploited in various malicious campaigns to compromise entire networks. One such vulnerability was disclosed in 2017, and enabled hackers to carry out remote cod… Continue reading One-of-a-Kind HP Printer Bug Bounty to Improve Network Security

CVE-2018-10901 in Linux Kernel Could Lead to Privilege Escalation

CVE-2018-10901 is the identifier of a recently disclosed vulnerability in Linux kernel. More specifically, the vulnerability resides in the KVM virtualization subsystem, a full virtualization solution for Linux on x86 hardware containing virtualization… Continue reading CVE-2018-10901 in Linux Kernel Could Lead to Privilege Escalation

Hack the Unhackable Bitfi Wallet and Get $100,000, Says John McAfee

Perhaps you know but John McAfee hasn’t been part of the company for more than 20 years. However, his name continues to be associated with it, despite his many other business endeavors. One of his most recent business ventures has…Read more
The… Continue reading Hack the Unhackable Bitfi Wallet and Get $100,000, Says John McAfee