Facebook iconTwitter icon
What is Reverse Engineering?
Thumb reverse engineering

Reverse engineering refers to the dismantling or disassembling of an object to determine how it functions for replication or improvement of the same thing. To be precise, the term means a hack of an already existing coded software. Instead of building something from the conception stage, one takes up an object and works their way rear-ward to determine its working principle

The technique is widely adopted in the computer and software industry. Developers can thereby retrieve source codes through reverse-engineering. They reverse program codes back to the source code. If, for...

» Read more
Crytojacking Won’t Kill Your Computer, but May Wreck Your Nerves
Thumb cryptojacking

Crytocurrencies such as Bitcoin should be familiar to you, but do you know cryptomining? Most importantly, do you realize how it has opened the doors to cryptojacking? If not, this article will provide a surprising overview. 

In a world increasingly greedy for crypto coins, cryptomining is the apex of resource exploitation. It is also arguably the most annoying computer threat ever created, since rather than interfering with your machines for the sake of disruption alone, cryptomining fiends just borrow some of your computing resources – often so discretely that you may...

» Read more
German government attacked by hackers
Thumb bundesverwaltung hack

Hackers penetrated the German's government main system, using highly intricate software. The hack has sparked an outroar among government officials, especially since some found out only through the media. 


Government Hack confirmed

On Thursday last week, German lawmakers demanded answers over why they were not duly informed on the system attack that had become public on Wednesday. According to reports, the German parliamentary committee was infuriated by the hack, calling it a 'veritable' attack on the state's network

Its believed that the hack...

» Read more
Why macOS users should be worried
Thumb apple gera%cc%88te

There is a common myth among many computer users that the Mac operating system is more secure and not prone to viruses. However, this is a dangerous misconception. One of the main reasons why people think this way is not because macOS is more secure than Windows, but because many hackers find it more lucrative to target Windows systems which have a larger market share compared to macOS. Windows accounts for almost 91.76% of the market while macOS only has 6.19%.


Malware in macOS

While malware is rare on the Mac, 2012 saw a spike of Malware attacking the system, with 11 new...

» Read more
How Machine Learning Looks to Damage Cyber Security in 2018
Thumb malwaredetection

If there is a rapidly evolving industry, it has to be the cyber security industry that is forecasted to become a $232 billion market in the next four years. Recent breakthroughs on matters to do with machine learning mean that Artificial Intelligence-enabled technologies currently in place are gaining traction. However, the cyber security industry seems to be locked into some of the early stages of what appears to be a security arms race with hackers.


Possible ways hackers could use to tamper with cyber security

A host of cyber security experts believe that machine learning in...

» Read more
Practical Advise
These Are The Different Types of Penetration Testing
Thumb pentesting

Penetration testing, pen-testing or ethical hacking are names given to the process of checking the vulnerability of a network, a computer system of a web-based application. In this era where cybercrimes have escalated, systems need to stay guarded and all loopholes sealed. There is no better way to do this other than thinking like a cyber attacker. Pen testing can either be done manually by qualified personnel or automatically by the use of a software application. The following are the different types of pentesting between which you can choose:


Targeted Penetration Testing


» Read more
Improving Employee Awareness for Effective Security Policies
Thumb itrichtlinie

Cybersecurity threats are a great cause for concern for organisations because they don’t just result in monetary losses, but also damage the reputation of a company. As technology continues to thrive, businesses are becoming more connected, meaning that a compromised network in one can affect multiple entities. For this reason, traditional security measures like firewalls don’t provide the same guarantees. The need to develop more robust security solutions that respond to modern threats has led to the conclusion that humans are the answer.


Human Behaviour and Security


» Read more
Practical Advise
Creating a Good Disaster Recovery Plan
Thumb urknall

What will you do when your enterprise is suddenly without electricity – for a week? Organization operations may be affected unexpectedly in case unplanned incidences occur. Disasters as such can result from human error, power outages, virus attacks and other causes. It’s the role of the management to set measures to ensure that the business can deal with these tragedies when they occur: A disaster recovery plan (DRP) is a documented approach for strategies to be used as a response in case unplanned events occur. A DRP must have all steps to be followed during such...

» Read more
Gemalto Global Cloud Data Security Study: The Cloud As A Risk?!
Thumb cloudx

Many european countries have always focused on protecting the assets stored in their corporate clouds. One of these is UK and Germany. However, the United Kingdom now seems to fall behind. This is according to the recent study that Gemalto, a digital security company, has conducted. 


Data Privacy and Protection

The need to regulate data in the cloud has continually been dire since customer information and payment information among other vital information are always at stake, because of their high level of sensitivity. Hence, many companies have...

» Read more
Meltdown & Spectre: The Two Bugs that Can Penetrate Your Processor
Thumb sicherheitslu%cc%88cke

Processors are designed to protect the most sensitive memory part of billions of computers. So what happens, if the processor can no longer accomplish this task? Recent research conducted by Google's Project Zero Team indicates that two primary flaws are affecting modern computers running on Intel, AMD, and ARM processors.

The flaws which are now referred to as Meltdown and Spectre work by isolating untrusted computer programs from accessing some processes on the device or the deep layers of the OS where sensitive information is stored. Hackers are only required to run a certain...

» Read more