by on October 30, 2017
Last week, the deadliest bomb blast to hit the Somali city of Mogadishu killed more than 350 people and injured around 400 others. Questions are now been asked as to why, more than 10 years after African Union peacekeepers set foot in the capital and six years after the al-Qaeda-linked group al-Shabab was pushed out, attacks still plague the coastal city. The Somali government blamed the October 14 blast on al-Shabab. President Mohamed Abdullahi Mohamed Farmajo told Al Jazeera o...
36 views 0 likes
by on September 8, 2017
When you sign up for a website, you’re often presented with a “Terms of Service” that outlines how your data is collected and used. But, did you know that all that information about you, that you work so hard to protect, is rarely ever your exclusive legal property? emoji_sad Most websites demand a perpetual license to your information, with rights to use it as they see fit. Some websites even grant themselves the right to sell your data individually, or even use your personal photos in ad...
38 views 0 likes
by on August 17, 2017
Undeniably, Kali is the best choice of Linux distro for Penetration Testers, Bug Bounty Hunters, and Security Researchers (if you think differently, please comment below). It carries a completely open source tools to perform the “Kill Chain“. However, many users tend to overlook the aspect of fine tuning the arsenal and launching a Vulnerability Assessment and PenTest (VAPT) right away. As a best practice, hardening and tweaking should be the first thing to do in every operating system after t...
41 views 0 likes
by on August 4, 2017
Recently we posted about how ads track you across the net and showed you how to save enough money to adopt a pony! #ChildhoodDream Unless you use a private search engine, like DuckDuckGo, then your search engine still likely has a copy of everything you’ve ever searched. Let’s take Google for example. Check out your Google Search History: searches, locations, interests. They’ve recorded it all. Deleting your Google search history will prevent it from being used by the highest bidder on the mi...
41 views 0 likes
by on July 24, 2017
By far one of the hottest topics in the cloud industry is security. It is a legitimate concern for anyone that is connected to the internet and/or using a cloud service. With the hacktivist group Anonymous making headlines and large companies suffering data breaches, it is no wonder security is a concern. There is currently an estimated 7 billion mobile devices and over 1 billion PCs now in the world. There is approximately 7.3 billion people on earth. That means the potential of hackers is ve...
38 views 0 likes
by on July 19, 2017
Given that most of us carry our smartphones 24/7, you’d expect them to be secure 100% of the time. You’d be wrong. Security threats to our mobile device are here to stay, and even more concerning – they’re on the rise. In 2016, McAfee reported detections of 100-1000 malware infections per hour in the US and several other countries worldwide. In late 2016, they predicted ransomware would pose a significant threat through the first half of 2017. In the same report, McAfee predicted Adobe Flas...
32 views 0 likes
by on July 19, 2017
There is something innately exciting about going shopping online and waiting for your purchase to arrive, it’s like you’re expecting a gift — even though you payed for it! The latest stats prove how popular ecommerce is: in the U.S. alone, 51% of Americans prefer to shop online and 96% have made an online purchase in their life. In fact, ecommerce is growing 23% year-over-year with online orders increasing 8.9% in Q3 2016. Breaking it down to generational trends, 67% of Millennials and 56% of Ge...
37 views 0 likes
by on July 19, 2017
Remember the days you had to be at work to work; go to the post office to pay a bill; visit a travel agent to book a trip; go the bank to do transactions; and drive to a store to buy clothes? Well, the internet has made our lives easy as we can do all these things and more without lifting a finger. Our lives are more efficient albeit it more hectic (ironically) and we get more done in less time. However, since internet networks first appeared, it opened the floodgates of freedom — for us, but...
37 views 0 likes
by on July 19, 2017
You’ve just wrapped up that novel you’ve been slaving at for years; finished the make-or-break confidential report for your boss; perfected the spreadsheet containing all your client’s accounts. Most of your work was done in Microsoft Word docs and Excel, and are stored locally on your computer. After completing all of this work you’re patting yourself on the back and sitting back for some well-deserved R&R. But you messed up. Mistake number one — you do this before sending the documents over to...
33 views 1 like
by on July 18, 2017
Internet has returned to Somalia after an outage of more than three weeks that cost the Horn of Africa nation the equivalent of $10m a day. The country has restored its internet connection after repairing a severed undersea cable that was accidentally hit by a ship, a telecoms official said on Monday. "The internet is now back, and clients are using it," said Adnan Ali, the media director for Hormuud Telecom, the country's top operator. University studies were disrupted, and businesses ...
38 views 0 likes
by on July 14, 2017
In the last three years, the proliferation in the growth of active threat actors such as polymorphic attacks and availability of sophisticated hacking tool has rapidly impacted the security posture and expenditure of any size of the organization. The driving factor for adoption of next generation SOC is constantly changing the environment, adapting more cloud-centric approach, and adopting the Internet of Things (IoT) and mobile technologies. To detect and prevent the environment from such types...
28 views 0 likes
by on July 6, 2017
You may know Wireshark as the ‘best network protocol analyzer in the world,’ but do you know how to use it? Being familiar with this popular tool can help you stand out on your resume, or can help you go further in your current IT role as it has plenty of benefits for users. “With more than 500,000 downloads a month, the IT industry has embraced Wireshark as the go-to tool for network troubleshooting, optimization, and security,” says TechTarget. Sure, it’s important to be able to configure a...
27 views 0 likes
Page generated in 0.1321 seconds with 68 queries and GZIP enabled on 45.56.101.149.