It is my sincere hope that when I say OWASP Zed Attack Proxy (ZAP), you say “Hell, yeah!” rather than “What’s that?”. This publication has been a longtime supporter, and so many brilliant contibutors and practitioners have lent to OWASP ZAPs growth…
Anonymous and Kba Squad take the responsibility for Cyber Attacks on Turkish TV Channel
The Hacktivist group Anonymous and the hacking team called Kba Squad take the responsibility for cyber attacks today on .24 Turkish Channel ( www.yirmidort.tv ). Anonymous said the .24 TV was offline for 6 hours. They also claims to take d…
Does Data Residency Reduce Cloud Risks?
Countries are establishing data residency regulation to protect private and classified data generated from their citizen by mandating storing this information within that country (the country of origin). The theory is that the laws of the coun…
How To Prevent Growing Issue of Encryption Based Malware (Ransomware)
The Internet is dark and full of terrors! Yes, the virtual world has its fair share of downsides as well. Online threats such as data hacking, virus infestation, malware attacks are common. Ransomware is another addition to the list. Ransomware progr…
Survey Reveals that Majority of WannaCry Victims are running Windows 7
According to data released today by Kaspersky Labs, roughly 98 percent of the computers affected by the ransomware were running some version of Windows 7 OS, with less than one in a thousand running Windows XP. 2008 R2 Server users were also hit hard…
You were not alone; Twitter went down everywhere
If you were wondering what’s going on with the social media giant Twitter, then don’t worry you were not alone. Reports indicated that Twitter was down in the United States, United Kingdom, Spain, the Netherlands, Japan, Italy, and France, etc.
Thos…
Security certifications (part 1): What are the differences?
Data security is one the most important aspects of digital business in today’s IT ecosystem, as organizations continue to experience breach after breach. Unfortunately – like other technological solutions – enterprises, …
Government backdoor: The basics of the plan to bypass encryption
The government want the ability to conduct surveillance on encrypted communications.
No matter how much law firms invest in data loss prevention and information protection, the government wants to be able to access private, per…
WannaCry Ransomware Attackers are sending new message to victims
The WannaCry ransomware attack is still infecting unsuspecting users, hospitals, and businesses around the world. While some users on Twitter are claiming they have already paid victims a massive amount of ransom money and are still waiting for the d…
Zomato Hacked; 17 Million Accounts Sold on Dark Web
Since 2015 the Dark Web marketplaces have been flourishing. From drugs, weapons, databases, fake documents to all sorts of illegal stuff are available for anyone at anytime. Recently, HackRead found out a vendor going by the online handle of “nclay” …