Ishan Srivastava

111 Flips | 7 Magazines | 1 Following | 22 Followers | @is014 | Keep up with Ishan Srivastava on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Ishan Srivastava”

What You Do Not Know About Malware May Hurt You

Malware is a tremendous nuisance for each and every website owner. It breaks down the consumer’s experience, will cause Google to penalize your …

Shape Security Brings Its Bot-Blinding Technology to Mobile Apps

The same tricks used against bot armies on the Web can now help fend off attacks against mobile APIs.<p>Two years ago, the startup Shape Security emerged from stealth mode with an interesting new idea for protecting websites from some of the most common forms of attack. Today it announced it has …

Apps

I hacked Citrix, says Russian hacker w0rm

Citrix, a US software company specialising in virtualisation and cloud computing, has reportedly been compromised by a Russian hacker called …

Hackers caused power cut in western Ukraine - US

<b>A power cut in western Ukraine last month was caused by a type of hacking known as "spear-phishing", says the US Department of Homeland Security (DHS).</b><p>The attack caused a blackout for 80,000 customers of western Ukraine's Prykarpattyaoblenergo utility.<p>Experts have described the incident as the …

Trend Micro security software made passwords vulnerable, allowed remote code execution

Google security researcher Tavis Ormandy is on a mission. A couple of weeks ago, he caught AVG circumventing Chrome’s malware checks in order to …

Trend Micro

Security Concerns Hamper Mobile App Adoption

The 2016 MEF Global Consumer Trust Report quantifies the anxiety and uncertainty people feel when engaging with the mobile app ecosystem.

Apps

Microsoft EMET: A Must Use Tool for Security Pros

What is EMET? EMET is a free tool provided by Microsoft, and the name stands for the Enhanced Mitigation Experience Toolkit. That's kind of a …

Sophos Predicts Top Cyber Security Trends for 2016

<b>Wazzup Pilipinas!</b><p>In the ever changing and increasingly complex landscape of cyber security, Sophos experts offer their top predictions for</b> …

Cybersecurity

Kaspersky Lab discovers Silverlight zero-day vulnerability

The dangerous flaw existed in technology used to display multimedia online and allowed the complete takeover of vulnerable systems.<p>Kaspersky Lab has …

France Rejects 'Backdoors' Law to Defeat Encryption

In the wake of the Paris terrorist attacks, a French lawmaker has proposed a draft bill that would require tech companies to include so-called …

When URL Shorteners and Ransomware Collide

We are all very familiar with URL shortening services, which are regularly used in Tweets and other social media. It is no secret that cyber …

Russia

Trend Micro anti-virus software leaves users open to attack

When they're not working on their own projects, Google engineers often focus on highlighting potential issues with software delivered by others. We've already seen bug hunter Tavis Ormandy expose a vulnerability in AVG's Chrome security add-on, but he's now also found an exploit in another popular …

6 business technology trends for 2016

Nearly every business uses the cloud for all or some of its business software. Roughly 93 percent to be exact. The cloud enables connectivity with other systems and reduced maintenance and mobility among other benefits.<p>The past few years have seen widespread adoption of cloud computing, but 2016 is …

A Cyber Security Pro Shares The Best Tricks For Cloud-Based Threat Scanning

<i>What are some technical considerations for cloud-based vulnerability scanners? originally appeared on Quora:</i> <i>The best answer to any question</i>.<p><b>Answer by Sai Ramanan, Corporate Information Security Lead at Quora, on Quora:</b><p><b>Vulnerability scanning is a stalwart practice of the Information Security</b> …

Dutch police claim they can read encrypted emails sent on BlackBerrys

But police in the Netherlands allege that they are able to intercept and decrypt emails sent on some PGP BlackBerry phones — a type of BlackBerry that comes with PGP encryption software pre-installed by third-party vendors.<p>"We are capable of obtaining encrypted data from BlackBerry PGP devices," a …

Encryption

Why Tech Companies Must Market Their Security Protection In 2016

In 2016, IT security will be more important than ever before. In the past couple of years, hundreds of millions of private records have been lost, and millions of dollars of damages have been suffered by businesses worldwide. From mobile hacks to endpoint hacks to network hacks – data breaches have …

Steam security error leaves personal information exposed

<b>UPDATE 26/12/15 11.35pm:</b> Steam's store is back online after a Christmas Day error exposed countless users' personal details.<p>A statement from Valve …

10 Tips to Fight Credit Card Fraud

Here are ten tips to help your ecommerce company avoid the losses associated with credit card fraud.

Google Patches Stagefright 2.0 Flaws on Nexus Devices

<b>Google on Monday released a security update for Nexus devices, aimed at resolving recently disclosed critical security vulnerabilities the media</b> …

Information Security

Researchers unearth scary new iOS malware, but Apple says it won’t affect devices with iOS 8.4 or later

Gone are the days when iOS malware reports were a rare thing. Following a wave of malware attacks on the iPhone and iPad – including a massive App …

Error. Page cannot be displayed. Please contact your service provider for more details. (25)

ISPs

3 Threats Affecting Big Data

Big data is crucial to any organization since it contains private information which, if it gets into the wrong hands, could be used against the …

Want Online Privacy? Here’s How (Hint: Don’t Google!)

Is there anything you can still do on your computer without Facebook or Google or the NSA looking over your shoulder?<p>Yes, indeed, contends Felicia …

Hackers exploit 'Security flaw' in iOS App to hack WeChat

WeChat hacked through ‘security flaw’ in iOS App, no user data or money stolen<p>The popular messaging app, WeChat, which has over 600 million users was …

iOS Apps

Using testssl.sh , Author: Basil Alawi S.Taher

Testssl project has announced the release of testssl 2.6. testssl.sh is a free command line tool which checks a server's service on any port for the …

Cyberattack 101: Why Hackers Are Going After Universities

With their vast stores of personal data and expensive research, universities are prime targets for hackers looking to graduate from swiping credit card numbers.<p>These aren't college kids trying to change their grades. They're potentially "nation-state actors" much like the hackers who have targeted …

Some Security Implication of Unikernels

I was attending the first GOTO London conference last week, in particlar the Rugged Track. One of the topics of conversation that came up was …