security

PCI DSS 3.1 and SSLv3: It’s best time to remove the 20 year old SSL protocol

To address the risk PCI DSS 3.1 updates requirements 2.2.3, 2.3 and 4.1 to remove SSL and early TLS as examples…

11 years ago

Mozilla Fundation, a step toward to full HTTPS implementation

The Mozilla Foundation is starting the operations to phase the HTTP connections in the Firefox browser according to "encrypt the…

11 years ago

Discover your Master padlock number of quick steps

The popular security expert Samy Kamkar illustrated a method to easily crack many Master padlock combinations in eight tries or…

11 years ago

Hacking telesurgery robots, a concrete risk

Security experts have conducted an experimental to analyze cyber security threats against teleoperated surgical robots in telesurgery. Technology will help…

11 years ago

The hacker Stefan Esser shows the jailbreak for iOS 8.4 beta 1

The well-known hacker Stefan Esser, also known as iOn1c, first published a concept video of the jailbreak iOS 8.4 beta…

11 years ago

Java – New vulnerabilities affects million applications

Oracle warned that a dozen of new Java security vulnerabilities could be exploitable remotely to gain access to a target…

11 years ago

Chrome starts pushing Java off the Web by deprecating NPAPI

Google Launches Chrome 42 that deprecates the NPAPI (Netscape Plugin API)  due to the numerous problems it caused in the…

11 years ago

Compliance: An Often Overlooked, Powerful Method of Threat Prevention

Which are different components that must be taken into consideration  to build an efficient information security foundation and prevent cyber…

11 years ago

Health records are the new goldmine for hackers

According to Top CSO news website, security experts predict that “Health records are worth more and easier to get than…

11 years ago

IBM X-Force reported a billion data records leaked in 2014

Within the year of 2014, a lot of data was leaked and this leads to grave concerns as to the…

11 years ago

This website uses cookies.