October, 2018

  • 16 October

    iPhone a Growing Target of Crypto-Mining Attacks

    The apple products specifically iPhone is the growing target for crypto-mining attacks, according to Check Point, iPhone attacks has increased by nearly 400% over the last two weeks in the September.

    The apple products specifically iPhone is the growing target for crypto-mining attacks, according to Check Point, iPhone attacks has increased by nearly 400% over the last two weeks in the September. In the recent published Global Threat Index, Check Point researchers said that they are into this and will continue …

  • 15 October

    Gang of ATM Thieves Including a European Caught in Islamabad

    Gang of ATM Thieves Including a European Caught in Islamabad

    FIA has successfully caught a gang who were involved in committing ATM fraud at various locations throughout the Islamabad. Among these arrested individuals a Romanian citizens was also involved. According to the Police, this gang who were found with 130 ATM credit cards, with up to 1000 fake ATM cards, …

  • 15 October

    Hackers Win Big by Gambling on Identity Spoofing

    Hackers Win Big by Gambling on Identity Spoofing

    While analyzing the global cybercrime patterns the ThreatMetrix has found that the identity spoofing, fueled by the stolen identity data, which is for sure the most prevalent attach vector for the gaming and gambling industry. Q2 2018 Gaming & Gambling Report who has discovered that the location (IP) spoofing attack …

  • 14 October

    Why Startups Fail

    Why Startups Fail

    Why are startups failing so badly everywhere we look? The first problem is the allure of a good plan, a solid strategy, and thorough market research. In earlier eras, these things were indicators of likely success. The overwhelming temptation is to apply them to startups too, but this doesn’t work, …

  • 11 October

    Microsoft Fixes Zero Day and Data Deletion Bugs

    Microsoft Fixes Zero Day and Data Deletion Bugs

    Microsoft has recently released the security fixes, this time they have addressed around century of vulnerabilities, which include one of the critical zero day and three of which have been publicly disclosed. The most critical vulnerability that needs to be fixing is CVE-2018-8453, a privilege escalation flaw in Win32 which …

  • 10 October

    BBC Reports Over 170 Devices Lost or Stolen

    BBC Reports Over 170 Devices Lost or Stolen

    The BBC has recently reported the stolen or lost devices which are around 170 these are lost or stolen for about two years; it is highlighting the challenges which are associated with managing a large portion of mobile workforce. Think tank Parliament Street has submitted Freedom of Information requests to …

  • 8 October

    Berkshire Hathaway (The Warren Buffett Way)

    Berkshire Hathaway (The Warren Buffett Way)

    The original company, Berkshire Cotton Manufacturing, was incorporated in 1889. Forty years later, Berkshire combined operations with the several other textile mills, resulting in one of the New England’s largest industrial companies. During this period, Berkshire produced approximately 25 percent of the country’s cotton needs and absorbed 1 percent of …

  • 6 October

    GRU Officers Allegedly Hacked Wi-Fi Networks Worldwide

    GRU Officers Allegedly Hacked Wi-Fi Networks Worldwide

    The Russian military intelligence officers alleged a traveled in person to offices of the targeted organizations in Switzerland, Brazil, Malaysia, and Netherlands to compromise the Wi-Fi Networks in a global ranging cyber-espionage campaign. The claim were made by the US Department of Justice (DoJ) as it indicted the seven GRU …

  • 4 October

    18 Vulnerabilities Found in Foxit PDF Reader

    18 Vulnerabilities Found in Foxit PDF Reader

    Eighteen vulnerabilities that were been discovered in Foxit PDF Reader, which is commonly used as an alternative to Adobe Acrobat Reader, which is the most used browser plugin globally, according to Cisco Talos. “Foxit PDF Reader is one of the most popular free tools for viewing, commenting on and editing …

  • 4 October

    Phishing Attack Impersonates Law Firm

    Phishing Attack Impersonates Law Firm

    Netskope’s Threats Research Lab recently revealed details about newly discovered phishing cyber-attack that was targeting the client bases of a law firm in Denver, Colorado, and across the entire U.S. Using a PDF file which is hosted in Azure’s Blob Storage service, the attackers could easily send the file as …