Wireless Security Guide: Introduction to LEAP Authentication
Introduction The LEAP (Lightweight Extensible Authentication Protocol) is a communications protocol that was developed by Cisco for use in point-to-point connections and wireless networks. However, its...
View ArticleUK Jails Cyber-Voyeur
A former civil servant has been imprisoned in the United Kingdom for hacking into the computer accounts of nearly 600 women and girls to blackmail them into sharing sexually explicit images of...
View ArticleTwo-Thirds of Employees Don’t Consider Security Whilst Home Working
More than two-thirds (68%) of UK workers do not consider the cybersecurity impact of working from home, according to a new study by VPNOverview.com. The survey of 2043 employees in the UK demonstrated...
View ArticlePanel Reflects on How Orgs Should Approach Security in 2023
The growing importance of ethical hacking in protecting organizations against the current threat landscape was discussed by a panel speaking during a HackerOne webinar entitled ‘Hacker Powered Security...
View ArticleUS Marines Create "Blue Team"
The United States Marine Corps today announced the creation of a Marine Corps’ Adversarial Cyber Assessment "Blue Team" (MCAT). A Blue Team is a group of people who identify security threats and risks...
View ArticleMore Security Vendors Admit to SolarWinds Attacks
Several more cybersecurity vendors have revealed that they were attacked by the same threat actors that compromised SolarWinds, although there appears to have been minimal if any impact on customers....
View ArticleReturn to SMS as Security Feature
New research by California IT service management company Okta has found an increase in the use of SMS as a security feature during the Covid-19 health crisis. The finding emerged from the latest...
View ArticleLogin Details of Tech Giants Leaked in Two Data Center Hacks
Login Details of Tech Giants Leaked in Two Data Center Hacks by carding forum Danger entertainers have hacked two server farms in Asia and got to login certifications of top innovation goliaths,...
View ArticleHackers Stole GoDaddy Source Code in a Multi-Year Data Breach
Hackers Stole GoDaddy Source Code in a Multi-Year Data Breach by carding forum In a documenting with the Protections and Trade Commission (SEC), GoDaddy uncovered that three serious security breaks had...
View Article