The Nmap project announced the release of Nmap 7.50, the first big release since last December that has hundreds of improvements. Nmap 7.50 is the new release of the popular the Network Mapper, the previous release dates back December 2016 and the new one brings hundreds of improvements. Nmap 7.50 includes the Npcap packet capturing driver […]
The Tor Project Team has announced the release of Tor Browser 7.0, it comes with multiprocess mode, content sandbox, and Unix domain sockets. The Tor Project has released the stable release of Tor Browser 7.0 that includes many security features and according to the development team, it also improved performance. The Tor network implements an anonymous communication […]
Is the hack back legal? There is a heated debate about the concept of active defense. What about the Active Cyber Defense Certainty (ACDC) Act? In a time where attribution of cyber crimes is all but impossible, the idea of allowing companies to ‘hack back‘ at their attackers seems far-fetched. However, Tom Graves (R-GA) has […]
Commenting the London Bridge terror attack, Prime Minister says there is âfar too much tolerance of extremismâ in the UK and urges Internet regulation. The London Bridge terror attack is fueling the debate about the Internet regulation, the Prime Minister Theresa May believe the terrorists had ‘safe spaces’ online and this is no more acceptable. Prime […]
ISIS has released a detailed guide on how to murder non-believers. The tutorial provides advice on how to lure targets via fake ads on websites to kill them. ISIS has released a detailed guide on how to murder non-believers. The tutorial provides advice on how to lure targets via fake ads on websites such as […]
According to a report published by Juniper Research, the economic impact of cybercrime is expected to reach $8 trillion price tag over the next five years. According to a report published by Juniper Research, the number of data records that will be compromised in security breaches in 2017 will reach 2.8 billion. The economic impact of […]
A study conducted by the Ponemon Institute shows insecure Medical devices are enlarging the surface of attacks for organizations. A study conducted by the Ponemon Institute, based on a survey of 550 individuals, shows that manufacturers and healthcare delivery organizations (HDO) are concerned about cyber attacks on medical devices. 67 percent of medical device makers and 56 […]
Hackers demonstrated that it is very easy to bypass the Samsung S8 iris scanner by using a camera, a printer, and a contact lens. Security experts have once against bypassed mobile Biometric system installed on a mobile device, the Samsung S8 model. Hackers used a camera, a printer and a contact lens to bypass the […]
A new firmware released for NightHawk R7000 Netgear routers includes a remote data collection feature, here’s how to turn off it. In December, a researcher who used the online moniker AceW0rm released a proof-of-concept code exploit working against some NetGear routers because the vendor did not reply to his ethical disclosure occurred in in August. Some versions of Netgear routers […]
Google is rolling out a new protection system called Google Play Protect, it is a machine-learning system to protect Android users. Good news for Android users, Google has introduced another security defense system, called Google Play Protect, to protect the devices running its mobile OS. Google already uses several security measures to protect the smartphone, such as […]