Our networked systems, be they computers, databases, phones, or other devices, are an endless battlefield. Zero-day exploits have been buzzing in the news in the wake of the Wikileaks concerns, where a number of such exploits had been posted where any who were interested could learn illegally about how to use them. Many are worried about…

Read More

2016 has been a year, to say the least. With the loss of legends like David Bowie, Prince, Alan Rickman and Mohammad Alli, and of course a tumultuous presidential election leaving much of the nation divided, we’re just about ready to put this year to bed. However, we still have the better half of December…

Read More

LinkedIn is a place where professionals can connect, discover professional opportunities and stay up to date with what’s happening in their field of work. However, not all of LinkedIn’s users are there to take advantage of the website as a resource. Rather, they are there to take advantage of other users. Fake profiles are not…

Read More

Andrew Auernheimer, the US “hacktivist” who broke into the network of AT&T said that the attack was done to highlight security failings. Its reported that Andrew Auernheimer aka Weev and Daniel Spitler stole email addresses from 120,000 iPad owners by exploiting a bug in the way AT&T set up its network. Due to this, Auernheimer…

Read More