I write about ethical hacking, cybersecurity and digital privacy.
-
50 Million accounts exposed after Facebook security breach. Facebook has revealed that almost 50 million of its users accounts were left exposed due to a security flaw. Facebook has more than two billion active monthly users, making security a high…
-
Master Digital Marketing Best Practices with this $19 Course
There are dozens of digital marketing techniques used to showcase brands and products, each with its own set of best practices. Learning these skills is vital to marketing your brand successfully, but chasing down everything you need to learn can…
-
Teen who hacked Apple gets no Jail Time
Responsible for downloading 90GB of secure files, the teen has escaped jail time. At the time of the offense he was 16 years old. Instead of jail time, he has received a probation of 8 months, a light sentence, but…
-
Google’s Project Zero has discovered a major Linux kernel vulnerability
This vulnerability exists for kernel versions 3.16 through to 4.18.8, beginning in August 2014. Project Zero is the name of a team of security analysts employed by Google and tasked with finding zero-day vulnerabilities. The vulnerability is a use-after-free (UAF)…
-
UEFI Rootkit attacks no longer theoretical after one has been discovered in the wild
ESET Cybersecurity researchers have discovered malware, named LoJax, capable of modifying a computer’s Unified Extensible Firmware Interface (UEFI), making it able to sustain an attack even after OS reinstallation and hard disk replacement. The malware was developed by Sednet, a…
-
The latest in funding and Recognition for Cyber Start-ups
When it comes to startups, a good idea and business plan will only get you so far, they need to grow in order to tap into their potential and bring new and exciting tech onto the market. Most tech startups…
-
Banking Trojan found hidden in apps on the Google Play Store
The Android operating system makes up 76.82% of the mobile operating system market share worldwide. With so many users, Android is an attractive target for hackers, making it one of the most vulnerable operating systems. In August 2018, Android users…
-
Back Up Your Data for Life for $65 with Degoo Premium
The first computers ever created featured meager storage capacities that barely exceeded one megabyte. We’ve come a long way since then; on an individual scale, we can fill up a terabyte of storage or two easily, so unless you have…
-
Dangerous Linux Vulnerability is discovered by security researchers
An integer overflow occurs when an arithmetic operation creates a numeric value that is outside the typical range that can be represented, this can give results that lead to unintended behaviour within the application. The exploit could allow an unprivileged…
-
Advance your career with new skills from these courses
Professional certifications are certainly important in the world of the ethical hacker or penetration tester, but never underestimate the importance of personal development and undertaking niche courses. The benefit of upskilling in different areas in your own time is that…
Join 900+ subscribers
Stay in the loop with everything you need to know.