Browsing Category
Security
393 posts
Is Using A Cloud File Server For Data Storage More Secure Than Using Online Storage Apps?
Over the last decade, data storage requirements have been increasing for both individuals and enterprises alike. The rise…
December 31, 2020
Microsoft, McAfee And Other Security Organizations Form Ransomware Task Force
Microsoft, McAfee and other 17 cyber security firms joined together to tackle cybercrime and form a Ransomware Task…
December 23, 2020
Using a VPN? Here are the 5 Biggest Myths Debunked
Are you skeptical of using a VPN because you’ve heard that only people who intend to indulge in…
December 22, 2020
Watcher – Open Source Cybersecurity Threat Hunting Platform
Watcher – Open Source Cybersecurity Threat Hunting Platform and developed with Django and React JS. Watcher is a…
How To Verify if You Have Been A Victim of An Online Hacker?
Regrettably, most antivirus software fails to provide peace of mind today. If a hacker attacked your system less…
December 17, 2020
Remote Command Execution Vulnerability Found in D-Link Routers
The security researcher found a vulnerabilities in D-Link routers. The cyber security research team of Digital Defense found…
December 8, 2020
Telegram App Server Down
Telegram Server Down? [UPDATE] Now its back .. Things are getting back to normal in Asia. If…
December 5, 2020
How Do Attackers Identify Victims For DDoS Attacks?
Distributed denial of service (DDoS) attacks cause American businesses to lose $10 billion a year. This kind of…
December 4, 2020
Xerror – Automated Penetration Framework
Xerror is an automated penetration framework, which will helps security professionals and non professionals to automate their pentesting…
November 25, 2020
Teler – An Real-time HTTP Intrusion Detection
Teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal…
November 24, 2020