Cybersecurity: Hacking Proprietary Protocols with Sharks and Pandas

Cybersecurity: Hacking Proprietary Protocols with Sharks and Pandas

There is a constant war which plagues cybersecurity; perhaps not only in cybersecurity, but in the world all around us is a battle between good and evil.  In cybersecurity if the “evil” side understands or pays more attention to a technology than the “good” side, we see a spike in cyber-attacks. The human race commonly fears what it doesn’t understand.  In a time of war, this fear is even greater if one side understands a weapon or technology that the other side does not. This course of events demands that both offensively and defensively minded “good guys” band together to remove the unknown from as much technology as possible. One of the most common unknown pieces of technology in...

How To Fix Your Hacked Joomla Site

How To Fix Your Hacked Joomla Website The fact that Joomla has plenty of powerful in-built features make it one of the most used CMS to create websites. Here, one gets access to amazing features like a banner manager, template manager, weblink manager, menu manager, user manager, etc. Unfortunately, its fame is becoming one of the attractive points for hackers to misuse it. How to fix your hacked Joomla site is becoming one of the hot topics. Joomla differs from the popular WordPress platform. WordPress enables website and blog creators to use various plug-ins including security to enhance their their website. You can learn more about this in the Securing Your WordPress Website Course here. BONUS: Use Discount Code...

How to Keep Consumer Data Safe

Every day on popular eCommerce sites, millions upon millions of people are entering valuable information. Their names, credit card information, addresses, and more all being uploaded in rapid quantities. All this sensitive info, especially in regards to payment profiles, has since become the target for malicious cyber attacks and hacking schemes. For businesses implementing their online payment systems, how can they ensure that consumer data is kept safe?....

...

Zoom Fixes Flaw Opening Meetings to Hackers

Zoom has patched a flaw that could have allowed attackers to guess a meeting ID and enter a meeting. NEW ORLEANS – Enterprise video conferencing firm Zoom has issued a bevy of security fixes after researchers said the company’s platform used weak authentication that made it possible for adversaries to join active meetings. The issue stems from Zoom’s conference meetings not requiring a “meeting password” by default, which is a password assigned to Zoom attendees for what is calls a meeting room. If meeting creators do not enable a “meeting password,” the only thing securing the meetings are Meeting IDs, which are 9, 10, or 11 digit meeting identifying numbers. Research unveiled the research Tuesday here at CPX 360,...

Scroll to top
Exit mobile version