Category: Industry News

Top Software Testing Services

Online Trackers Are Now Shifting To New Invasive CNAME Cloaking Technique

More and more browser developers are constantly pushing harder to shift to third-party tracking, whereas organizations of advertising technology are now relying on a new DNS method to exploit these defenses resulting in threats and risks to user privacy and web security. A bunch of researchers including Guner Acar, Wouter Joosen, Yana Dimova, Lukasz Olenjnik,…
Read more

What is Nmap And Why You Should Use It?

IT managers, network administrators, and security experts generally suffer an endless fight, continuously keeping an eye on what precisely is running on their organization’s network and the possible weaknesses/vulnerabilities that hide inside. While there is an abundance of screening/monitoring utilities accessible for network mapping and security reviewing, none can beat Nmap’s blend of flexibility and…
Read more

Experts Find A Way To Know Whatever Is Being Typed By A User During A Video Call

Another new assault method has been discovered by experts which can understand the keys pressed by the targeted user at the opposite end during the video conference call by utilizing only the video feed to connect displayed body movements to the content being typed/composed. The examination was done by Mohd Sabra, and Murtuza Jadliwala from…
Read more

Hackers Behind APOMacroSploit Malware Builder Exposed By Researchers

Cybersecurity researchers have revealed another sort of Office malware dispersed as a component of a vindictive email campaign that focused over 80 clients worldwide trying to control casualty machines and take data remotely. The tool dubbed as APOMacroSploit is a macro abuse generator that permits the client to make an Excel document with the capability…
Read more

$1.3 Billion Cryptocurrency Heist Blamed On Three North Korean Hackers By US

On Wednesday, three North Korean hackers were charged by the US Department of Justice for reportedly planning to steal and extort from financial and business organizations, an amount of more than $1.3 billion in form of cryptocurrency and cash. It is believed that three individual hackers are part of a military intelligence organization of North…
Read more

Staying Secure While Using Crypto Wallets

Hot and Cold are two classifications for all sorts of crypto wallets. The Hot wallet is one that stays online or is connected to the Internet. Whereas a Cold wallet is one that is offline or isn’t connected to the Internet. For keeping excessive amounts of crypto coins, Cold wallets are the best option and…
Read more

Apple Will Hide Its Users IP From Google By Proxying Requests Of Safe Browsing

Apple‘s forthcoming iOS 14.5 update will be accompanied by another new feature that will divert all the fake site checks through its own proxy servers as a workaround to secure client privacy and forestall spilling IP addresses to Google. An implicit security-centered feature of the Safari browser, known as Fraudulent Website Warning, cautions clients about…
Read more

Cybersecurity Is Lagging When Threats For API Are Multiplying

Investor’s attention is nowadays being grabbed by emerging API-based companies. Forbes, which is an American business magazine, as of late considered the API economy the next big thing. But as they increase, so do security risks and threats. As per the report by Salt Security, 91% of present companies or organizations have encountered an API…
Read more

MoU Signed By HCL Technologies With IIT-Kanpur For The Development Of Cybersecurity

On Monday, HCL (Hindustan Computers Limited) Technologies, released an update on its newsroom, in which the organization said that they have entered/signed a Memorandum Of Understanding (MoU) with the Indian Institute Of Technology Kanpur (IITK) to collaborate in the sector of cybersecurity. HCL Technologies is an Indian multinational technology company that specializes in information technology…
Read more

Microsoft Believes That Government Intervention In Response To Cyber Attack Would Result In ‘The Fog of War’

Microsoft recently took the open door to alert the central government to be aware of the issues it takes with the proposed critical infrastructure/framework legislation by highlighting a few parts of the Bill that could inadvertently make Australia’s security situation even less secure. The draft legislation being referred to, the Security Legislation Amendment Bill 2020,…
Read more