The National Cyber Security Centre has announced the launch of four ‘Active Cyber Defence’ programs to improve basic level of cybersecurity across UK business and government departments
Computer Scientists: Passwords Can be Acquired from Brain Waves
A study by computer scientists from University of Alabama at Birmingham and the University of California Riverside suggests that passwords can be acquired from brain waves.
CIA May Have Developed Linux Malware
The latest Vault 7 dump on WikiLeaks, dated 29 June 2017, contains a document on Linux malware the CIA may have developed, named OutlawCountry.
Attacking SSH with Metasploit and Medusa.
What is SSH??? SSH, also known as Secure Socket Shell, is a network protocol that provides administrators with a secure way to access a remote computer.The best known example application is for remote login to computer systems by users. Here with the help of Metasploit and Medusa,I tried to get the Password of SSH. … Continue reading Attacking SSH with Metasploit and Medusa.
8Tracks Breach Exposes Millions of Accounts
Online radio service at least hashed and salted passwords
Defeating pass-the-hash attacks with two-factor authentication
Implementing two-factor authentication for remote access is a great way to keep attackers out of your network. Users’ credentials are floating all around the internet. But attackers can still get in your network through malware and other tools. In t…
Linux Systemd Vulnerability Enables DNS Attacks
Vulnerability in Linux systemd can trick a computer to execute malicious code or can trigger system crashes
Shadow Brokers Taunt and Blackmail NSA
Shadow Brokers provide promised exploits and leaked data at June’s end and promise more in July
Nato Confirms Cyber as Legitimate Military Domain
Attack on one member state is an attack on all
PwC: UK Councils Face Uphill Security Challenge
Just a third of local authority leaders confident in current approach