Technology


SolarWinds attack explained

And why it was so hard to detect The recent breach of major cybersecurity company FireEye by nation-state hackers was part of a much larger attack that was carried out through malicious updates to a popular network monitoring product and impacted major government organizations and companies. The incident highlights the severe impact […]


Several High-Profile Accounts Hacked

Social media platform Twitter, earlier today on Wednesday, was on fire after it suffered one of the biggest cyberattacks in its history. A number of high-profile Twitter accounts, including those of US presidential candidate Joe Biden, Amazon CEO Jeff Bezos, Bill Gates, Elon Musk, Uber, and Apple, were breached simultaneously in […]


QSnatch Data-Stealing Malware

Cybersecurity agencies in the US and UK yesterday issued a jointadvisory about a massive ongoing malware threat infecting Taiwanese company QNAP’s network-attached storage (NAS) appliances. Called QSnatch (or Derek), the data-stealing malware is said to have compromised 62,000 devices since reports emerged last October, with a high degree of infection in Western […]


Industrial VPN Flaws

Cybersecurity researchers have discovered critical vulnerabilities in industrial VPN implementations primarily used to provide remote access to operational technology (OT) networks that could allow hackers to overwrite data, execute malicious code, and compromise industrial control systems (ICS). A new report published by industrial cybersecurity company Claroty demonstrates multiple severe vulnerabilities in enterprise-grade […]


An increase in the Number of Cyber Attacks after the end of self-isolation

As 62% of respondents answered, when companies transferred employees to remote work at the beginning of the pandemic, the most concern was ensuring secure remote access and VPN. 47% of respondents reported that they were concerned about preventing attacks using social engineering methods, and 52% called the protection of endpoints […]


New Mobile Internet Protocol Vulnerabilities

High impact vulnerabilities in modern communication protocol used by mobile network operators (MNOs) can be exploited to intercept user data and carry out impersonation, fraud, and denial of service (DoS) attacks, cautions a newly published research. The findings are part of a new Vulnerabilities in LTE and 5G Networks 2020 report published […]


Microsoft joins encrypted DNS club

Microsoft is the latest browser vendor to join the encrypted DNS club by supporting DNS over HTTPS in Windows 10. In Build 19628 and higher, you’ll be able to encrypt your DNS traffic to prevent your geeky flatmate, that hoodie-wearing person in your local coffee shop, and possibly your ISP […]


Best Practice Tips for Password Administration

The end of passwords: Industry experts explore the possibilities and challenges Passwords have been an industry-standard as well as industry headache for a considerable length of time and their administration henceforth has become the misery of end-users and IT administrators, yet there are alternatives to take advantage of the experience […]


Annke Security Camera System

For a starter Home Security Camera System I would recommend the Annke BH500 I purchased this system in February 2020 and very happy with my purchase. These are 5MP cameras and have a very clear picture. I have 4 Bullet Cameras and 1 Dome Camera I purchased through Amazon with […]


Password Managers

Security flaws found in popular password managers Care should be taken when choosing a Password Manger. You should always use a Password Generator. Not all they’re cracked up to be? Several password vaults contain vulnerabilities, both new and previously disclosed but never patched, a study says Several popular password managers […]


How to create an isolated network

Option 1:   If you have two public IP’s from your service provider you can simply install aswitch between the router and the modem andthen configure each separately as if it were two different businesses in different buildings. Router 1 and 2 can be wired or wireless. Option 2:  If you only have one […]


How to protect yourself against Ransomware

Pick strong passwords. And don’t re-use passwords, ever. Make regular backups. They could be your last line of defense against a six-figure ransom demand. Be sure to keep them offsite where attackers can’t find them. Patch early, patch often. Ransomware like WannaCry and NotPetya relied on unpatched vulnerabilities to spread around the globe. Lock […]


Stop Using IE

In a recent cybersecurity issue, some hackers from North Korea are attacking Internet Explorer by exploiting a vulnerability, which is said to be a zero-day flaw. The company Microsoft has not yet spoken on the issue and is still silent.  Users should immediately stop using Internet Explorer for a while […]


USB Flash Drive Alert

The cybercriminals have gotten all the savvier when it comes to finding out new ways of administering malware into the victims’ devices. The next in the list happens to be “Malicious USB sticks”. These are employed whenever an attacker needs a “physical” entrance to a computer or any device for […]


Creating SSH Keys on Windows

PuTTYgen is an key generator tool for creating SSH keys for PuTTY. It is analogous to the ssh-keygen tool used in some other SSH implementations. The basic function is to create public and private key pairs. PuTTY stores keys in its own format in .ppk files. However, the tool can also convert keys to and from other […]


FAKE Factory Network

Factory Workers need to read this! Researchers simulated a real-looking “Industrial prototyping” organization with fake employees, PLCs, and websites to study the types of cyber-attacks that commonly on such networks. The elaborately fake organization’s website and the network worked on a highly advanced interactive “honeypot” network that worked extensively on […]


Awesome Hosting Provider

Are you are looking for the BEST Hosting Provider in the Industry? Then your First and Last Stop will be at KnownHost! They have Awesome Incredible Knowledgeable Customer Friendly Support and Sales Staff! All of my tickets have been answered in 3 mins or under! An established business since 2006 […]


Server Security

This is why it is Very Important to have Top Notch Security Policies in place on Your Server! The new Snake Ransomware family sets out to target the organizations’’ corporate networks in all their entirety, written in Golang and containing a significant level of obfuscation, the observations and disclosure for […]