Would be attackers are able to exploit SHAREit permissions to execute malicious code through vulnerabilities that remain unpatched three months after application owners were notified of the vulnerabilities. To make it worse its an Android app that has been downloaded over 1 billion times and is rife for exploitation that can let hackers hijack features […]
Category Archives: Information Security
Yay, Finally Removing Disruptive Participants is here. Under the Security icon, hosts and co-hosts can now temporarily pause their meetings and remove disruptive participants according to a Monday Zoom blog post. “By clicking ‘Suspend Participant Activities, all video, audio, in-meeting chat, annotation, screen-sharing and recording during that time will stop, and Breakout Rooms will end,” the […]
According to the PCI Standards the goals of penetration testing are: 1.To determine whether and how a malicious user can gain unauthorized access to assets that affect the fundamentalsecurity of the system, files, logs and/or cardholder data. 2.To confirm that the applicable controls required by PCI DSS—such as scope, vulnerability management,methodology, and segmentation—are in place. […]
Cyber crime is more profitable than the global illegal drug trade. (Source: Cybersecurity Ventures) The profit from the illegal drug industry amounts to around $400 billion annually. For comparison, cyber criminals have earned a total of around $600 billion in 2018 and how long have cyber criminals been around compared to the drug trade? Enough said!!
73% of black hat hackers said traditional firewall and antivirus security is irrelevant or obsolete. (Source: Thycotic.com) According to the same survey, 80% of hackers say “humans are the most responsible for security breaches”.
66% of businesses attacked by hackers weren’t confident they could recover. (Source: Fortune) Most businesses don’t really know if they’re prepared for a cyber attack. Actually, 75% of all businesses don’t even have a formal cyber attack response plan.