Category Archives: Network Scan

CyberSecurity minute: a lot happens in just sixty seconds

CyberSecurity minute It is a matter of fact that we are currently living a difficult period as far as Cyber Attacks are concerned. The number of stolen records is constantly increasing. Nowadays, according to a RiskIQ report, we have a very busy CyberSecurity minute: 5.518 records leaked (as far as well-known and disclosed data breaches Read more »

Sprint Vulnerability: the flaw in the Online Portal

A researcher discovered a security flaw (the Sprint vulnerability) in the online system of Sprint that allowed anyone to access the internal staff portal. Sprint is the fourth largest form in the USA that provides wireless and internet services. As of October 2017, the company has around 54 million active users of its services offered Read more »

EE Security Vulnerabilities In Their Online Portals

For the past few days, the telecom sector seems to combat CyberSecurity issues. Reportedly, EE, a UK-based cellular firm, patched two different flaws in its system within one week. Fortunately, the vulnerabilities were discovered by some white-hat hacker before anyone could exploit them. Yet, the bugs were not trivial to be ignored. EE Patched The Read more »

Foreshadow – Intel CPUs Affected By L1TF Vulnerabilities

Foreshadow: While the chaos for the horrifying Spectre and Meltdown is still going, researchers discover another vulnerability in Intel CPUs that is even more robust. Two different groups of researchers discovered the vulnerability named “Foreshadow” and reported it to Intel. Upon further investigations, Intel found two more related flaws, which the researchers termed as “Foreshadow-NG”. Read more »

SamSam Ransomware Has Raised $6 Million

samsam ransomware: Criminal Hackers exploit ransomware attacks as a robust money making strategy as they easily coerce the victims to pay money. Continuing with this strategy, they are now making money with the notorious SamSam malware. A latest study reveals that SamSam ransomware has raised around $6 million for Criminal hackers in ransom demands. SamSam Read more »

Web Security: top 5 attacks targeting web applications

Web Security is a hot topic for everyone in these days. A Positive Technologies report of 2017 showed how all of the websites and web applications have at least one well-known vulnerability. The same report shows how the 70% of websites and web applications have at least one high severity vulnerability as well.   As a matter of Read more »

Wi-fi Security: WPA3 is not hacker proof.

Wi-Fi Security? It’s time. Wi-Fi Alliance launched WPA3. It will certainly ensure a higher CyberSecurity level and, as a consequence, it will benefit users both in terms of privacy and GDPR Compliance. However, WPA3 does not make wireless networks hacker proof. First of alla, let’s have a look together at the features and benefits of WPA3. Read more »

DDOS Distributed Denial of Service: what is it?

DDOS: introduction DDoS: Distributed Denial of Service. Whenver connections overload a server, there’s no more the chance to start new connections. This situation takes place when a lot of compromised systems send at the same time data traffic to the target system, causing its crash. Such an overload could make a server, a website or an online Read more »

DOS Denial of Service: what do you need to know about it?

DOS: introduction DoS stands for “Denial of Service” and this term, in the CyberSecurity field, specifies a failure due to an illegal attack. The resources of an IT system run out because of the just mentioned attack, this leads to the impossibility from the system side to erogate the service to the clients who require it. The Read more »

IP address: introduction and explanation

IP address: introduction You can visualize the IP address or “internet protocol address” in the graphic interface as a numerical label. It allows to univocally identify a host (which is a physical device such as a computer, a printer, a router or a smartphone). The host is connected to a network that uses the internet Read more »