Category: Threats & Vulnerabilities

Learn about the different types of threats facing our networks and systems

A Single Text Character From The Telugu Language Can Crash Any Apple Device

An Italian researcher has recently discovered a text bug that can crash any Apple iPhone, iPad, or Mac. A single character from the Telugu language, which is a language native to India, will crash the device when sent via the iOS messaging app, What’s app, Facebook Messenger, Gmail, or even in the iOS Notes The ...

Switch Security

I've made several posts about switches, how they function, and the amazing features they possess, but now it's time to talk about their security. Let's start with switching loops. Switching Loops and STP/RSTP In some cases, a network can develop a "switching loop," sometimes called a "bridging loop." In networks with a lot of switches, ...

PenTest Edition: My Favorite Wi-Fi Hacking Tools – 2018

Penetration testing and security analysis is an integral aspect of cybersecurity. The ability to master some of these tools is certainly indispensable. Penetration testers and other cybersecurity professionals use these tools everyday to examine the security posture of their networks. All of these tools are free to download; however, whether you can use them or ...

1.4 Billion Plaintext Credentials Found on the Dark Web: Protect Yourself With A Strong Password

4iQ Finds A File Containing 1.4 Billion Credentials on the Dark Web Last week, 4iQ discovered 1.4 billion cleartext credentials (e.g., usernames, e-mails, and passwords) in a single 41GB file on the Dark Web. To be exact, there are 1,400,553,869 usernames/clear text password pairs. Several of these credentials were tested and verified to work. The ...

The Approaching Arrival of Cyberterrorism

Introduction The biggest vulnerability confronting cybersecurity professionals today is one we aren't even fully prepared to handle. This vulnerability requires cybersecurity specialists to be armed with the latest technology in network and information security in order to safeguard US critical assets. The FBI and CIA acknowledge its existence and its significant risk to critical and ...