Category: Technical

  • How does The Internet Work?

    So, how does the internet work? The internet is something nearly everyone uses on a daily basis. We’ve all come to rely on it and some of us make our living using it. So, how does it work? How do computers connect? How do messages pass between computers? Is it really a bunch of tubes?…

  • Zero-Day Flaw Found In ‘Linux Kernel’ Leaves Millions Vulnerable

    Zero-Day Flaw Found In ‘Linux Kernel’ Leaves Millions Vulnerable A new critical zero-day vulnerability has been discovered in the Linux kernel that could allow attackers to gain root level privileges by running a malicious Android or Linux application on an affected device. The critical Linux kernel flaw (CVE-2016-0728) has been identified by a group of…

  • Get A Glimpse Of The Cyber Threat Landscape For 2016 And Beyond | Hacked

    Here’s a rundown of the cyber threat landscape for 2016 and beyond, courtesy of a report from Intel security. Coming In 2016 The 2016 predictions covers threats from ransomware, infrastructure attacks, attacks on automobile systems and the sale and warehousing of stolen data. • Hardware: Attacks on hardware and firmware will continue while the market…

  • Internet Society Releases Internet of Things (IoT) Overview Whitepaper: Understanding the Issues and Challenges of a More Connected World | Internet Society

    As you will see in the document, we believe the security in the Internet of Things is perhaps the most most significant challenge and we believe ensuring security in IoT must be a fundamental priority. Poorly secured IoT devices and services can serve as potential entry points for cyber attack and expose user data to…

  • Dell’s Laptops are Infected with ‘Superfish-Like’ pre-installed Malware

    From The Hacker News: Dell’s Laptops are Infected with ‘Superfish-Like’ pre-installed Malware Similar to the Superfish malware that surrounded Lenovo laptops in February, another big computer manufacturer Dell spotted selling PCs and laptops pre-installed with a rogue SSL certificate that could allow attackers: To impersonate as any HTTPS-protected website and spy on when banking or…

  • An interesting article on web apps and ad blockers

    And here I thought I was the only one having issues when browsing with ad blockers turned on… Why “Ad Blockers” Are Also Changing the Game for SaaS and Web Developers

  • Quantum Defense – The Race to Military Applications of Fundamental Science

    The first superpower to harnesses quantum science will achieve military super-powers, Defense One reports: unbreakable communication security, and quantum supercomputers much more powerful than today’s machines. As usual, the race is between the US and China. Defense Undersecretary Frank Kendall said: Much like autonomy, quantum sciences is an area that could yield fundamental changes in…

  • WordPress Security Vulnerability

    Please update your WordPress version to 4.2.1 and any out-of-date plug-ins installed immediately! According to Securi: [su_quote cite=”By Daniel Cid” url=”https://blog.sucuri.net/2015/04/security-advisory-xss-vulnerability-affecting-multiple-wordpress-plugins.html”] Security Advisory: XSS Vulnerability Affecting Multiple WordPress Plugins By Daniel Cid on April 20, 2015 . 61 Comments Multiple WordPress Plugins are vulnerable to Cross-site Scripting (XSS) due to the misuse of theadd_query_arg() and…

  • Twitter Bootstrap

    Twitter Bootstrap: what is is and what does it mean to you…

  • PWN — The New Term In Town

    So you may have been seeing this word “pwn” in articles regarding security and hacking and thought it was a typo and it should have read “own.” Well you’re partly correct. Pwn (pronounced “powned”) “is an leetspeak (elite speak) term meaning to appropriate or to conquer or gain ownership. In hacker-ese, it means to compromise…