Search Results for: cryptographic Blog Post What Is Hash Function? What Is It Used For and Why Is It Important? February 5, 2021 In the world of information technology and cybersecurity the term “hash”, or “hash function” appears abundantly. Hundreds of hashing algorithms... Blog Post Only 54% of Cybersecurity Pros Set Rules for Key Creation January 11, 2020 When you arrive at the office in the morning, you have to input your usernames and passwords in order to... Blog Post Microsoft Reveals Critical Bugs Allowing Takeover of NETGEAR Routers July 21, 2021 Microsoft has revealed critical bugs regarding NETGEAR routers that could cause data leaks and system compromise. More particularly, researchers from... Blog Post Netgear Authentication Bypass Open Up the Possibility of Router Takeover August 17, 2021 Microsoft researchers have disclosed multiple authentication bypass vulnerabilities in Netgear routers. These vulnerabilities open the possibility of total control over... Blog Post Common ICS Vulnerability Disclosure Framework August 2, 2021 The Cybersecurity and Infrastructure Security Agency’s (CISA) activities aim to promote coherence between government and industry. This capability helps CISA... Blog Post The Most Frequent Actively Exploited Vulnerabilities in 2020 February 16, 2021 Every week, security researchers discover and publish many new actively exploited vulnerabilities. In 2020, they disclosed over 18 000 vulnerabilities.... Blog Post Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and... Blog Post NSA Discloses of Windows 10 Vulnerability January 16, 2020 On January 14th, the National Security Agency (NSA) Cybersecurity Directorate head Anne Neuberger announced a critical Windows 10 bug... Blog Post What is Address Resolution Protocol (ARP) poisoning? April 14, 2020 ARP is a protocol that is used to resolve IP addresses to MAC addresses (globally unique numbers). ARP poisoning also... Blog Post Top 5 Blockchain Security Issues in 2019 December 6, 2019 Blockchain is a new application model of computer technology such as distributed data storage, point-to-point transmission, consensus mechanisms, and encryption... Blog Post Cybersecurity Landscape Predictions for 2020 December 30, 2019 “Small and medium-sized businesses (SMB) will be a bigger target for cybercriminals in 2020 The Ponemon Institute reports that 76%... Blog Post Cold Boot Attacks to Decrypt All Modern Computers September 17, 2018 Researchers have revealed that hackers can steal encryption keys, credentials to corporate networks and passwords as long as they have... Blog Post Chinese State Hackers Steal Highly-Sensitive US Navy Data: Report June 8, 2018 Chinese state-sponsored hackers have stolen a massive trove of sensitive information from a US Navy contractor, according to the Washington... Blog Post Another Cryptocurrency Exchange Hack Sees Theft of $530 Million January 26, 2018 A major Japanese cryptocurrency exchange has been hacked into, losing some 58 billion yen ($534 million) in what could very... Blog Post Cybercriminals Make Crypto Gains with Spoofed Premium Software December 26, 2017 While social engineering remains an infiltration method for cybercriminals to install cryptocurrency miners on victims’ computers, ‘free’ premium software packages...
Blog Post What Is Hash Function? What Is It Used For and Why Is It Important? February 5, 2021 In the world of information technology and cybersecurity the term “hash”, or “hash function” appears abundantly. Hundreds of hashing algorithms...
Blog Post Only 54% of Cybersecurity Pros Set Rules for Key Creation January 11, 2020 When you arrive at the office in the morning, you have to input your usernames and passwords in order to...
Blog Post Microsoft Reveals Critical Bugs Allowing Takeover of NETGEAR Routers July 21, 2021 Microsoft has revealed critical bugs regarding NETGEAR routers that could cause data leaks and system compromise. More particularly, researchers from...
Blog Post Netgear Authentication Bypass Open Up the Possibility of Router Takeover August 17, 2021 Microsoft researchers have disclosed multiple authentication bypass vulnerabilities in Netgear routers. These vulnerabilities open the possibility of total control over...
Blog Post Common ICS Vulnerability Disclosure Framework August 2, 2021 The Cybersecurity and Infrastructure Security Agency’s (CISA) activities aim to promote coherence between government and industry. This capability helps CISA...
Blog Post The Most Frequent Actively Exploited Vulnerabilities in 2020 February 16, 2021 Every week, security researchers discover and publish many new actively exploited vulnerabilities. In 2020, they disclosed over 18 000 vulnerabilities....
Blog Post Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and...
Blog Post NSA Discloses of Windows 10 Vulnerability January 16, 2020 On January 14th, the National Security Agency (NSA) Cybersecurity Directorate head Anne Neuberger announced a critical Windows 10 bug...
Blog Post What is Address Resolution Protocol (ARP) poisoning? April 14, 2020 ARP is a protocol that is used to resolve IP addresses to MAC addresses (globally unique numbers). ARP poisoning also...
Blog Post Top 5 Blockchain Security Issues in 2019 December 6, 2019 Blockchain is a new application model of computer technology such as distributed data storage, point-to-point transmission, consensus mechanisms, and encryption...
Blog Post Cybersecurity Landscape Predictions for 2020 December 30, 2019 “Small and medium-sized businesses (SMB) will be a bigger target for cybercriminals in 2020 The Ponemon Institute reports that 76%...
Blog Post Cold Boot Attacks to Decrypt All Modern Computers September 17, 2018 Researchers have revealed that hackers can steal encryption keys, credentials to corporate networks and passwords as long as they have...
Blog Post Chinese State Hackers Steal Highly-Sensitive US Navy Data: Report June 8, 2018 Chinese state-sponsored hackers have stolen a massive trove of sensitive information from a US Navy contractor, according to the Washington...
Blog Post Another Cryptocurrency Exchange Hack Sees Theft of $530 Million January 26, 2018 A major Japanese cryptocurrency exchange has been hacked into, losing some 58 billion yen ($534 million) in what could very...
Blog Post Cybercriminals Make Crypto Gains with Spoofed Premium Software December 26, 2017 While social engineering remains an infiltration method for cybercriminals to install cryptocurrency miners on victims’ computers, ‘free’ premium software packages...