Mbahet në Tiranë CyberCON konferenca në Muajin Evropianë të Sigurisë Kibernetike

Në kuadër të fushatës ndërgjegjësuese të Bashkimit Evropian Muaji Evropianë për Siguri Kibernetike në Tiranë është mbajtur konferenca për Siguri Kibernetike të quajtur “CyberCON Albania”. Që vjen bashkëpunim i ICT Academy, Ecronex Media dhe CIT Canadian Institute of Technology në Xheko Imperial në Tiranë. Continue reading “Mbahet në Tiranë CyberCON konferenca në Muajin Evropianë të Sigurisë Kibernetike”

Advertisements

Hackers Conducting RDP Attacks Using New Technique to Bypass Protections

source : gbhackers

A Microsoft Windows component, RDP was designed to provide administrators, engineers, and users with remote access to systems. However, threat actors have been using the technology for nefarious purposes, and the trend continues, especially since an RDP attack is usually more difficult to detect than a backdoor.  Continue reading “Hackers Conducting RDP Attacks Using New Technique to Bypass Protections”

How hackers can exploit devices used at home

How hackers can exploit devices used at home

As Americans increasingly fill their homes with smart technology, the risk of hackers exploiting their devices is growing.

Experts say the expanding ecosystem of internet-connected devices such as smart thermostats, home security systems and electric door locks are increasingly susceptible to hackers, including those trying to leverage voice-command devices.

Source: thehill Continue reading “How hackers can exploit devices used at home”

20 Critical Security Controls: Control 9 – Limitation and Control of Network Ports, Protocols, and Services

20 Critical Security Controls: Control 9 - Limitation and Control of Network Ports, Protocols, and ServicesKey Takeaways for Control 9
Reduce your attack surface. So much of control 9 is about limiting the external attack surface of a system. This is always the first step in securing an endpoint.
Duplication with other controls. Everything being done in control 9 is going to be accomplished by completing other controls elsewhere. I would probably leave this one for last as it’s the least impactful (due to duplication) out of any of the controls.

Source: tripwire

Continue reading “20 Critical Security Controls: Control 9 – Limitation and Control of Network Ports, Protocols, and Services”

HACKER PUBLISHES IOS SECURE ENCLAVE FIRMWARE DECRYPTION KEY

A hacker Thursday afternoon published what he says is the decryption key for Apple iOS’ Secure Enclave Processor (SEP) firmware.

The hacker, identified only as xerub, told Threatpost that the key unlocks only the SEP firmware, and that this would not impact user data.

“Everybody can look and poke at SEP now,” xerub said.

Source: threatpost

Continue reading “HACKER PUBLISHES IOS SECURE ENCLAVE FIRMWARE DECRYPTION KEY”

Blog at WordPress.com.

Up ↑