Category: ethical hacking
-
50 Million accounts exposed after Facebook security breach
50 Million accounts exposed after Facebook security breach. Facebook has revealed that almost 50 million of its users accounts were left exposed due to a security flaw. Facebook has more than two billion active monthly users, making security a high priority concern. The security breach has caused Facebook’s shares to drop by 3% on Friday,…
-
Master Digital Marketing Best Practices with this $19 Course
There are dozens of digital marketing techniques used to showcase brands and products, each with its own set of best practices. Learning these skills is vital to marketing your brand successfully, but chasing down everything you need to learn can be a hassle. Luckily, this Complete Digital Marketing Course compounds all of these skills into…
-
Teen who hacked Apple gets no Jail Time
Responsible for downloading 90GB of secure files, the teen has escaped jail time. At the time of the offense he was 16 years old. Instead of jail time, he has received a probation of 8 months, a light sentence, but the judge reiterated the seriousness of the crime. The boy cannot be named as he…
-
Google’s Project Zero has discovered a major Linux kernel vulnerability
This vulnerability exists for kernel versions 3.16 through to 4.18.8, beginning in August 2014. Project Zero is the name of a team of security analysts employed by Google and tasked with finding zero-day vulnerabilities. The vulnerability is a use-after-free (UAF) attack, which works by exploiting the cache invalidation bug in the Linux memory management system,…
-
UEFI Rootkit attacks no longer theoretical after one has been discovered in the wild
ESET Cybersecurity researchers have discovered malware, named LoJax, capable of modifying a computer’s Unified Extensible Firmware Interface (UEFI), making it able to sustain an attack even after OS reinstallation and hard disk replacement. The malware was developed by Sednet, a Russian state sponsored hacking group who have been operating since 2007 and have carried out…
-
The latest in funding and Recognition for Cyber Start-ups
When it comes to startups, a good idea and business plan will only get you so far, they need to grow in order to tap into their potential and bring new and exciting tech onto the market. Most tech startups look to venture capitalists to acquire this funding for growth, since most startups will die…
-
Banking Trojan found hidden in apps on the Google Play Store
The Android operating system makes up 76.82% of the mobile operating system market share worldwide. With so many users, Android is an attractive target for hackers, making it one of the most vulnerable operating systems. In August 2018, Android users were told to be on high alert after it was found that 150 apps on…
-
Back Up Your Data for Life for $65 with Degoo Premium
The first computers ever created featured meager storage capacities that barely exceeded one megabyte. We’ve come a long way since then; on an individual scale, we can fill up a terabyte of storage or two easily, so unless you have the extra storage to back up your data, you’ll have to go out and buy…
-
Dangerous Linux Vulnerability is discovered by security researchers
An integer overflow occurs when an arithmetic operation creates a numeric value that is outside the typical range that can be represented, this can give results that lead to unintended behaviour within the application. The exploit could allow an unprivileged user to gain admin access to the system. The security researches also released a proof…
-
Advance your career with new skills from these courses
Professional certifications are certainly important in the world of the ethical hacker or penetration tester, but never underestimate the importance of personal development and undertaking niche courses. The benefit of upskilling in different areas in your own time is that you set yourself apart when it comes to the job market, employers are typically looking…