cybersecurity (252)

Faster Fixes: Ubuntu's Plan to Reduce Linux Kernel Package Vulnerabilities

Kleber Souza, an engineer at Canonical who maintains Linux kernel packages for Ubuntu, has announced a new kernel update cycle. The new cycle, which is codenamed "4/2", involves generating additional SU kernel package updates (Security Update) that i...

Jacob Enderson · 03 August 2023 · 70

The Evolution of Online Security: Pass Keys vs Passwords

In the ever-evolving landscape of online security, passwords have long been the primary means of authentication. However, even with the assistance of password managers, they come with their fair share of issues. From being hard to remember to the ris...

Jacob Enderson · 01 February · 117

Inside the Mega Glitch: Unlocking Hidden Windows Functions with a Secret Microsoft Tool

This probably wasn't planned this way: During a so-called bug bash for Windows 11, Microsoft employees accidentally shared a link to the StagingTool, a program that is used internally at Microsoft to activate hidden features in Windows 11. Sometimes...

Kelly · 03 August 2023 · 84

22 Steps to Protect WordPress: Anti-Hacker Security

We have made a compilation of recommendations to protect your WordPress as much as possible. Being the most used content manager in the world, it is quite common for you to receive attacks from hackers, brute force, and robots. If you have all the op...

Alex · 18 July 2022 · 163 · 1

Security updates: Attackers can compromise Aruba switches

Certain switch models from Aruba are vulnerable. The developers have closed a security hole. Network admins should update their Aruba switches to the latest version for security reasons. If this is not done, attackers can compromise the operating sys...

Kelly · 03 August 2023 · 49

Linux IPv6 "Route of Death" 0day Vulnerability in the Kernel

Details of an unpatched (0-day) vulnerability (CVE-2023-2156) in the Linux kernel have been disclosed. This vulnerability allows an attacker to crash the system by sending specially crafted IPv6 packets (packet-of-death). The issue only manifests whe...

Jacob Enderson · 11 months ago · 84 · 1

Linux Kernel Vulnerabilities Grant Local Attackers Root Privileges

Two components of the Linux kernel contain security vulnerabilities that grant local attackers root shell access. A first exploit has been made public. Two components of the Linux kernel are affected by security vulnerabilities that allow local attac...

Den W. · 11 months ago · 144 · 1

Hackers Target iPhones with New Malicious Software

Smartphones like the iPhone produced by Apple are only sometimes safe in locked conditions. If a device has an app called Signal, there's a possibility of the phone getting hacked in the near future. Forbes reports that that's how the forensic team...

Alex · 19 January 2023 · 121

Leakage of Intel private keys used for firmware validation of MSI

During an attack on the information systems of MSI, hackers were able to extract over 500 GB of the company's internal data, including source code for firmware and related tools for their assembly. The attackers demanded $4 million for non-disclosure, but MSI refused and some data was published publicly. Among the published data were Intel's privat...

Kelly · 11 months ago · 100 · 1

Critical Security Vulnerability in Google Chrome

Google has released an update for the Chrome web browser during the night, which addresses at least one critical security vulnerability. This vulnerability allows attackers to smuggle in and execute malicious code. In total, the update includes fixes...

Alex · 11 months ago · 56

Christmas update for Windows: Microsoft fixes 6 critical vulnerabilities

Microsoft traditionally ends the last Patch Tuesday of the year with fewer patches for Windows, Office & Co. This is also the case this year, although the number of closed security holes has rarely been so high. In addition, however, there are always...

Jacob Enderson · 14 December 2022 · 106

How Much Does an Ethical Hacker Earn in the United States

Hackers have made their mark in cyberspace, with their reputation as the bad guys who use unethical methods to cause harm. However, you can't label all hackers together because some use their skills and expertise for good. These individuals are refer...

Alex · 05 June 2022 · 73

5 Free Online Network Security Courses You Should Follow in 2023

There are numerous online courses for network security, most of which are paid courses, but there are also some open source or government funded free quality courses open to the public. For novices, computer students, administrators and even some jun...

Dayton C. Wilton · 22 December 2022 · 79

Top 5 Android Hacking Tools for Penetration Testers

Mobile devices are convenient for our lives and can also be used to commit fraud. According to the latest statistics, 70% of online scams occur through mobile platforms. Staggering. But how to avoid them in the first place? Well, android penetration testing is one of the answers. In the realm of ethical hacking, hacking is used to improve system...

Alex · 27 February 2023 · 93

10 ways to protect yourself from smishing

Mobile phones have revolutionalised how we communicate with each other. We can talk to nearly anyone worldwide, simply by reaching into our pockets. The trouble is that having a phone on you at all times is not only beneficial to you but also to crim...

Alex · 20 April 2023 · 117

Web Security Best Practices for Safeguarding Your Website from Cyber Threats

In today's digital landscape, where websites serve as the storefronts and communication hubs for businesses, ensuring robust web security is paramount. Cyber threats are constantly evolving, making it imperative for website owners to implement effect...

Steve Martin · 11 months ago · 49