NordVPN Breach FAQ – What Happened and What’s At Stake?

NordVPN, one of the most popular and widely used VPN services out there, yesterday disclosed details of a security incident that apparently compromised one of its thousands of servers based in Finland.

Earlier this week, a security researcher on Twitt… Continue reading NordVPN Breach FAQ – What Happened and What’s At Stake?

Google, Mozilla, Apple Block Kazakhstan’s Root CA Certificate to Prevent Spying

In a move to protect its users based in Kazakhstan from government surveillance, Google, Apple and Mozilla finally today came forward and blocked Kazakhstan’s government-issued root CA certificate within their respective web browsing software.

Startin… Continue reading Google, Mozilla, Apple Block Kazakhstan’s Root CA Certificate to Prevent Spying

8 New HTTP/2 Implementation Flaws Expose Websites to DoS Attacks

Various implementations of HTTP/2, the latest version of the HTTP network protocol, have been found vulnerable to multiple security vulnerabilities affecting the most popular web server software, including Apache, Microsoft’s IIS, and NGINX.

Launched … Continue reading 8 New HTTP/2 Implementation Flaws Expose Websites to DoS Attacks

Kazakhstan Begins Intercepting HTTPS Internet Traffic Of All Citizens Forcefully

If you are in Kazakhstan and unable to access the Internet service without installing a certificate, you’re not alone.

The Kazakhstan government has once again issued an advisory to all major local Internet Service Providers (ISPs) asking them to make… Continue reading Kazakhstan Begins Intercepting HTTPS Internet Traffic Of All Citizens Forcefully

Firefox to Automatically Trust OS-Installed CA Certificates to Prevent TLS Errors

Mozilla has finally introduced a mechanism to let Firefox browser automatically fix certain TLS errors, often triggered when antivirus software installed on a system tries to intercept secure HTTPS connections.

Most Antivirus software offers web secur… Continue reading Firefox to Automatically Trust OS-Installed CA Certificates to Prevent TLS Errors

Destructive Malware Used to Attack Winter Olympics Infrastructure

The Olympic Winter Games in Pyeongchang, South Korea, started off with a cyberattack that disrupted the games’ official website and caused technical problems in the press center at the Olympic Stadium shortly before the opening ceremony Feb. 9. W… Continue reading Destructive Malware Used to Attack Winter Olympics Infrastructure

Auditing Your WiFi Security Posture in Response to the WPA2 KRACK Vulnerability

News of a major vulnerability within the standard WPA2 protocol has been rippling around the world. IT organizations are scrambling to audit their WiFi security posture in light of this…
The post Auditing Your WiFi Security Posture in Response to th… Continue reading Auditing Your WiFi Security Posture in Response to the WPA2 KRACK Vulnerability

Auditing Your WiFi Security Posture in Response to the WPA2 KRACK Vulnerability

News of a major vulnerability within the standard WPA2 protocol has been rippling around the world. IT organizations are scrambling to audit their WiFi security posture in light of this…
The post Auditing Your WiFi Security Posture in Response to th… Continue reading Auditing Your WiFi Security Posture in Response to the WPA2 KRACK Vulnerability

Linux TCP Flaw allows Hackers to Hijack Internet Traffic and Inject Malware Remotely

If you are using the Internet, there are the possibilities that you are open to attack.

The Transmission Control Protocol (TCP) implementation in all Linux systems deployed since 2012 (version 3.6 and above of the Linux kernel) poses a serious threat … Continue reading Linux TCP Flaw allows Hackers to Hijack Internet Traffic and Inject Malware Remotely