7 Defence

25 Results / Page 3 of 3

Background

todaySeptember 25, 2020

  • 123
  • 2
  • 95
close

Cyber security + Cybercrime + Global news 7 Defence

Microsoft Windows XP Source Code Leaked Online

Microsoft’s long-lived operating system Windows XP—that still powers over 1% of all laptops and desktop computers worldwide—has had its source code leaked online, allegedly, along with Windows Server 2003. The source code for Microsoft’s 19-year-old operating system was published as a torrent file on notorious bulletin board website 4chan, and ...

todaySeptember 25, 2020

  • 120
  • 2
  • 103
close

Cyber security + Global news 7 Defence

Fortinet VPN Default Configuration Allows MITM Attacks

Default configurations of Fortinet’s FortiGate VPN appliance could open organizations to man-in-the-middle (MitM) attacks, according to researchers, where threat actors could intercept important data. According to the SAM IoT Security Lab, the FortiGate SSL-VPN client only verifies that the certificate used for client authentication was issued by Fortinet or another ...

todayAugust 20, 2020

  • 168
  • 2
  • 190
close

Data Breach 7 Defence

Experian South Africa Suffers a large Data Breach Affecting Millions

The South African largest credit check company Experian yesterday announced a data breach incident that exposed personal information of millions of its customers. While Experian itself didn’t mention the number of affect customers, in a report, the South African Banking Risk Information Centre—an anti-fraud and banking non-profit organization who worked with Experian to ...

todayJuly 27, 2020

  • 194
close

Cyber security 7 Defence

Why is cyber security important?

Cyber crimes in this world have cost more than $2 trillion and is expected to reach $6 trillion by 2021. So it’s essential for us to protect our digital assets from cyber criminals, in our world cyber security is not optional it has become a necessity now. It’s not just ...

todayJuly 26, 2020

  • 226
close

Cyber security 7 Defence

What is zero trust model?

If you are familiar with the cybersecurity space then you might have heard this name- Zero Trust. The Zero Trust Model or Zero Trust Architecture was created in 2010 by John Kindervag. It simply means not to trust anyone both inside and outside of the network. DON’T TRUST ANYONE! Organisations should never ...

todayJuly 25, 2020

  • 670
  • 1
close

Cyber security 7 Defence

Defining Cyber security, Risk, vulnerabilities & threats

Cyber Security is the protection of computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. Vulnerability means weaknesses or gaps in a security program that can be exploited to gain unauthorized access to an asset. Threat is anything that can exploit a vulnerability, intentionally or accidentally, and ...