Cloud-based applications uniquely demand architecture and more strict security configuration, on which developers might be loose the focus. Insufficient security setup and direct access to the database on the backend have become a prominent factor of a massive data breach. Often hackers will target your database for malicious attacks,...
Recently, DNA testing packages gifts are shifting more popular. This ancestry testing business has grown into a $99 million industry. However, the next enigma is the sensitivity of the DNA information they collect has boosted privacy alarms. Unfortunately, for now, DNA results from genetic testing not covered under HIPAA. Why a DNA data breach is [...]
A researcher team from Cisco found there are more than half a million router has infected by stealthy malware dubbed as VPNFilter. The researcher team called Talos have said that VPNFilter is more powerful man-in-the-middle attack which can survive over device reboot. Defined as three-stage malware, VPNFilter currently has infected over 54 countries, the number [...]
All organizations increasingly rely on Information Technology, and the Internet. While on the other side the threat of Cyber-attacks and data breaches are also real and on the rise. We are no longer a question this, but rather when one will be the target. Data breach is an event that exposes confidential or sensitive information [...]
On 27 June 2017 one day before Ukraine public holiday, noted as the beginning attack of another variant of Petya ransomware attacking Ukraine business. Ukrainian Vice Prime Minister Rozenko Pavlo tweeted a picture of a computer that had been infected by ransomware also of “network felt down” message. This attack time noted as the beginning of [...]
Ransomware is malicious software which prevents users to access their files until a victim pay the ransom in exchange for decryption keys. Similar to a trojan and virus, ransomware spread through emails or other, including vulnerabilities found on the target device. Upon infecting, Ransomware encrypts users' data and demand a varying amount of ransom payment [...]