Category: Security

Security

Blockchain: Overhyped buzzword or real-deal enterprise solution?

Written by:

IT vendors are rolling out blockchain-based capabilities, often in response to high levels of customer interest While blockchain is among the hottest technologies in the enterprise …

Security

New Bitcoin Malware Attacks Copy and Paste Their Way to Co-Opted Currency

Written by:

Bitcoin is breaking records. As noted by Business Insider, the cryptocurrency hit an all-time high on Nov. 1, 2017, and its bull run shows no sign of …

Security

CloudFlare Wants to Make DDoS Attacks a Thing of the Past

Written by:

DDoS attacks have been happening for ages. In recent years, they’ve increased in both frequency and impact. Whole swaths of the U.S. lost Internet connectivity in …

iOS DevelopmentJava DevelopmentSecurity

Google launches security features while report shows iOS threats outpacing Android

Written by:

Google has cracked down on security with the launch of Play Protect and other new defense mechanisms while a report has been released which shows iOS …

Security

Hackers can now decrypt satellite phone calls(satellite communications) in ‘real time’ within a fraction of a second

Written by:

Researchers have uncovered a new attack method that can make encryption used in satellite communications unsecure.

Security

Fireball Malware: Ticking Time Bomb or All Hot Air?

Written by:

Researchers from Check Point Software discovered that more than 250 million Windows computers worldwide were infected, SecurityWeekreported. According to the company’s blog, Fireball malware is like “a pesticide …

Security

6 Ways Your Apps May Be Attacked: How Crowdsourced Penetration Testing Improves Software Development

Written by:

In the modern world of security and Apps security , there is stuff you worry about and stuff you don’t. Most companies have SaaS and third-party applications, …

Security

Smart Cities, Big Problems? The Risk of Malware in IoT-Enabled Infrastructure

Written by:

Cities are notoriously inefficient. As populations rise, everything from mass transit and road maintenance to power generation and garbage collection becomes more complex and costly. Beyond …

iOS DevelopmentSecurity

Turkish Crime Family group will remotely wipe hundreds of millions of iPhones unless Apple pays ransom

Written by:

Hackers belonging to the Turkish Crime Family group threaten to remotely wipe hundreds of millions of iPhones unless Apple pays a ransom.

Security

JSON Libraries Patched Against Invalid Curve Crypto Attack

Written by:

A number of JSON libraries using the JSON Web Encryption specification (JWE) to create, sign and encrypt access tokens have been patched against an attack that …

Hey Everybody... WELCOME Comtech!HERE You can know us better
+