DDOS or Distributed Denial Of Service attack are only getting larger and more devastating. Last week saw what is so far the most powerful DDOS attack when this was aimed at GitHub with record braking of 1.35 terabits per second. A day later it was...
A Google researcher at Google Project Zero discovered a number of flaws in a well known peer-to-peer file sharing application. The vulnerabilities “allow an attacker to infect a victim with malware or collect data on the users’ past...
For modern processing to optimise their data crunching, they do something called branch prediction. For example in a high level, if you have an IF statement and if x=1 you would do one thing and if x=0 would do another. What modern processors might...
The cyber security space is expending with tones of new firms popping up every year. There is a premium problem to be solved. In late we have seen the Endpoint market accused to have gone stale, and in the last couple of years we literally saw wars...
The Meltdown and Spectre are serious vulnerabilities and have wide reaching impact. They affect nearly every computer and device running current processor. Big vendors are affected including Microsoft, Apple MacOS, Google Android, ChromeOS as...
Motherboard put up a rather good digital security guide. It will be regularly updated and it is portable in the form of pdf.
DDE or Dynamic Data Exchange is a protocol that establishes how application interact and send messages to share data through shared memory. The bad guys unfortunately were leveraging a loophole to exploit this by using a booby-trapped document...
Estonia is a progressive country when it comes to the use of technology. It is an early adopter of innovative technology to make their population digital citizens. As with anything new there are challenges to overcome and for Estonia there is one...
It has been another busy GITEX technology week in Dubai. The myriads of security products were dominated by Machine Learning and Deep Learning in particular. Of course inetelligence corrolation was also noticeable, some better than others.
A popular software developed by a subsidiary of Avast were infiltrated. An unknown entity maliciously hid malware in the form of backdoor in Piriform CCleaner, a widely used cleaning utility. Piriform was acquired by Avast back in July 2017. This is...