31 Oct 2018

Halloween may be the one night in the year when ghouls, ghosts and goblins roam the streets, but in the online world a series of cyber security threats are constantly lying low just beneath the surface. Halloween activities include trick-or-treating but a cyber security trick is something no one wants to fall victim to this…

31 Oct 2018

Apple released its latest version of iOS mobile operating system, iOS 12.1 and within few hours an iPhone enthusiast managed to find a passcode bypass hack that can permit anyone to see all contacts’ private information on a locked iPhone. The iPhone passcode bypass bug was found by Jose Rodriguez, a Spanish security researcher. In…

30 Oct 2018

Windows Defender which is the built-in anti-malware tool of Microsoft Windows 10 has got an upgrade to run inside an ultra-secure sandbox environment. This is the first complete antivirus software that can run in a sandbox. Sandboxing is a software management strategy that isolates applications from critical system resources and other programs and makes it…

27 Oct 2018

The Information Commissioner’s Office (ICO) has issued a maximum fine of £500,000 to Facebook for the first time for data protection mistakes which resulted in the Cambridge Analytica scandal. The fine was imposed based on the calculation using the UK’s old Data Protection Act 1998 which can levy a maximum penalty of £500,000 which is…

26 Oct 2018

Cathay Pacific Airlines have suffered a major data breach where personal information of around 9.4 million passengers have been stolen. The company has confirmed on Wednesday that they have discovered unauthorized access to the IT systems which contains sensitive personal information of both its customers and of its business unit Hong Kong Dragon Airlines. The…

25 Oct 2018

Let us take a look at some of the top Cyber security tools used to find the vulnerable systems and protect your privacy. Cyber security and IT security is the protection of internet connected systems included hardware, software or electronic data from theft, damage, disruption or misdirection of the services they do. Most of the…

25 Oct 2018

Cybersecurity firm FireEye have discovered proof about the involvement of a Russian Research Lab in the development of the TRITON malware which had prompted several industrial systems to unexpectedly shut down last year, including a petrochemical plant in Saudi Arabia. TRITON which is also called as Trisis, is a piece of ICS malware designed to…

23 Oct 2018

Windows 10 October 2018 Update also called as Build 1809 seems to have troubles with bug since it was released. Most of the bugs were fixed but a new bug has been reported to extract zip files using Windows built-in zip functionality. Usually when a zip file is extracted in Windows, if the contents are…

22 Oct 2018

Remesh RamachandranIT Security Professional – Security Researcher & Consultant for the Government, Enthusiast, Malware Analyst, Penetration Tester. http://www.remeshr.com

21 Oct 2018

The cyber security industry is rapidly growing every day and it is a rising problem. Day by day more and more malware is being launched and it is necessary to define how the current cyber security industry looks like. Lots of people share information and lives online and the possibility of someone exploiting those is…