Skip to main content

Posts

Showing posts from July, 2020

WhatsApp and Telegram users are still vunerable to Cyber attacks.

WhatsApp and Telegram users are still vunerable to Cyber attacks. All those users who are using the web versions of WhatsApp and Telegram are at the risk of being cyber attacked. Yes, you have read it right! A vulnerability which hasn’t been patched yet could allow hackers to gain control over accounts and access personal data using a malware-laced image. Moreover, this security flaw can make hackers gain control of personal data such as contacts, shared files, as well as private messages. Ironically, the exploit which can expose the personal info of users, utilizes the same encryption which is meant to protect user messages from espionage. Technically speaking, WhatsApp and Telegram use an end-to-end encryption, designed to make sure only senders and recipients are entitled to view the content in the messages. The negative side of this process is that it prevents the application in checking for malicious codes on the message contents. So, users who send malicious conte...

7 Coolest Cybersecurity Tools 2020

7 Coolest Cybersecurity Tools 2020 The 10 cybersecurity tools making wave so far in the market which have emphasized on asset protection, downtime minimization, and better workflow to safeguard clouds, endpoints and mobile devices as a whole. Cisco SecureX: feb 2020 Features 1. Security Analytics 2. Automating security workflows to speed threat detection and response. 3. Threat investigation and remediation 4. Data and events analysis across more than 150 million endpoints as well as network traffic from routers, switches, public clouds and private data center environments. 5. Identifies who and what has been targeted within minutes using data enrichment across security products and threat intelligence feeds. 6. Brings the power of Cisco Talos threat analysts into customers SOC to hunt for the latest threats. CrowdStrike Endpoint Recovery Services feb 2020 Features: 1. Combining the power of CrowdStrike Falcon platform and threat intelligence 2. Rea...