News
New Linux error allows hacking into encrypted VPN connections
A group of cyber security research workers has revealed a brand new severe vulnerability impacting many Linux and also Unix-like systems, including FreeBSD, OpenBSD, Mac-OS,…
Work from Home? Microsoft Edge V84 is a good reason to Ditch Chrome
After a long journey of Microsoft internet explorer and less welcoming to the initial MS Edge web browser version, Microsoft is now curious to…
Hackers vs Hackers: Intrusion Truth Group deanonymized Chinese APT17 members
The anonymous grouping of Intrusion Truth continues to deanonymize Chinese "government hackers." This time, the data on the alleged members of APT17 were made public.…
What is a CA Certificate and How Does It Work?
A virtual private network (VPN) is set up using a tunneling protocol, which is typically layered and encrypted. To establish the VPN connection, it is…
Insulting comments in Instagram
Earlier this year one of the most popular Instagram applications launched a new feature. Its main task is to analyze written comments and warn the…
Top 7 Cyber Security Threats to Watch Out For
While it might seem obvious to some, many might wonder: why even bother making a list of the most important cyber security threats? Experts certainly…
New tools to improve data security
The human factor has been and remains the “Achilles heel” of data hacking. Multi-factor authentication can be an important step towards establishing digital identity control…
Hackers are Exploiting WP File Manager Flaw
Vulnerability in the File Manager WordPress plugin has more than 700,000 active installations & 52% of the users are affected. Bugs, flaws, and vulnerabilities always…