-
Donald Hoxhaj commented on the post, Multi-Factor Bio-Metric Authentication for home security, on the site 6 years, 5 months ago
I think this would be fantastic innovation altogether to make security of IoT devices more efficient. However there has not been much progress made until today on the security of these applications against brute force attacks. Moreover, IoT itself is in a growing phase of technological development and this startup would definitely be an icing on the cake.
-
Donald Hoxhaj commented on the post, Facebook Aims to Make Security More Social, on the site 6 years, 5 months ago
I am particularly sceptical with Facebook’s strategy considering the recent sham it was exposed to with selling data. I guess making it more social may not be an effective way of demonstrating ethicality. The best way is to make information not social, but rather secure. The article says that ‘There’s a design focus on making sure users can easily…[Read more]
-
Donald Hoxhaj commented on the post, Google Chrome personal data hijacking, on the site 6 years, 5 months ago
Pretty interesting article Neil. Chrome is definitely something more than 40% of consumers use in their daily lives and it is quite bizarre to see Google saw this much later. Not sure how many consumers were already duped of this. Though I haven’t faced this ever before in Google Chrome, but did face it in other web applications that I use for…[Read more]
-
Donald Hoxhaj commented on the post, North Korea Threat Group Targeting Turkish Financial Orgs, on the site 6 years, 5 months ago
That’s pretty bad considering that these attacks happened on the top 3 financial institutions. It’s still unsure why the attacks happened, but if they have already compromised sensitive financial data, then it might actually cause huge financial loss or even breakdown of the Turkish economy. It’s important to revisit the security systems or try to…[Read more]
-
Donald Hoxhaj commented on the post, VPN Leaks Data, on the site 6 years, 5 months ago
Fred,
That’s actually quite interesting because over 40% of SMBs use VPN for remote business operations. I am unsure of the severity of these transactions, but if VPNs are leaking sensitive information such as IP address and location, this possibly has a huge place to instigate another cyber threat. Attackers can easily catch hold of these IPs to…[Read more] -
Donald Hoxhaj commented on the post, Unpatched DoS Flaw Could Help Anyone Take Down WordPress Websites, on the site 6 years, 5 months ago
Shi,
Nice summary of the article. I am quite surprised that WordPress allows execution of the PHP file at run time by changing the parameters. A similar kind of flaw was witnessed a couple of years back when users can potentially change variable parameters of images in WordPress sites and identify information of websites without security logins.…[Read more] -
Donald Hoxhaj commented on the post, Sacramento Bee Hit with Ransomware, on the site 6 years, 5 months ago
Hi Richard,
The one good thing that the company did I feel was to immediately inform the users about the leak. However, I am not quite sure how protected the 3rd party database were. I feel organizations should have their in-house database for most of the critical transactions and customer information, rather than outsourcing it to 3rd party…[Read more] -
Donald Hoxhaj wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 6 months ago
With the advent of cloud storage, many companies have come to trust this storage method and transferred crucial information from their hard-drives to the ‘cloud’. However, not everyone is equally imp […]
-
Donald Hoxhaj wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 6 months ago
In order to enforce a more efficient mechanism to fight cyber crimes and fortify cybersecurity, the National Cyber Security Centre (NCSC) has announced the launch of a new cyber categorization system. The purpose […]
-
Donald Hoxhaj commented on the post, Week 14 Update, on the site 6 years, 6 months ago
U.S. UK Government Say Russia Increasing Infrastructure Attacks
http://www.eweek.com/security/u.s.-uk-government-say-russia-increasing-infrastructure-attacks
There have been increased concerns on the increasing Infrastructure attacks by some of the Russian cyber-criminals. These cyber-attacks have been targeted mostly towards Infrastructure…[Read more]
-
Donald Hoxhaj commented on the post, Week 12 Update, on the site 6 years, 6 months ago
Satwika,
Pretty useful information on the pros and cons of Google Cloud platform. Certainly one can make use before hosting their services. The Cons are even more interesting because that is something that we don’t find on the internet very easily and hundreds of information only makes it more confusing. I feel Google Cloud is definitely…[Read more]
-
Donald Hoxhaj commented on the post, Week 12 Update, on the site 6 years, 6 months ago
Shi,
Definitely a good article to read and ponder on the safety of passwords. This is bewildering to see the exposure of more than 130,000 passwords. What is not understood is that while companies do take a good amount of measure to inform the customers about the password breach, they fail to communicate on the future steps that it’s going to…[Read more]
-
Donald Hoxhaj commented on the post, Week 13 Update, on the site 6 years, 6 months ago
Scott,
Nice article to ponder upon how safe our windows systems are. More than 30% organizations in the fortune companies use Windows Servers to run their internal systems and I am surprised how this was being allowed to be shipped even after the vulnerability was discovered by Chinese researchers. Microsoft should have rather immediately patched…[Read more] -
Donald Hoxhaj commented on the post, Week 11 Update, on the site 6 years, 6 months ago
Shi,
I am surprised to see companies like Microsoft unable to test the patches even before releasing them for consumers around the world. Usually these issues are taken place through cross-device testing way in advance before releasing. I am still unsure what drastic effects has the recent Meltdown Patch has done to systems and what breaches…[Read more]
-
Donald Hoxhaj commented on the post, Week 11 Update, on the site 6 years, 6 months ago
I agree with you Sev. Companies have become cautious with the recent Facebook data scandal, even though they might have done the same way of sharing data with publishers or advertisers. With this, customers will surely be confident of sharing their information with companies and can trust of absolute confidentiality. It would definitely be…[Read more]
-
Donald Hoxhaj commented on the post, Week 10 Update, on the site 6 years, 6 months ago
Fred,
I agree to your points Fred and this is to a large extent an issue that Equifax should have dealt much earlier. The information of all customers is out in the open and any breach here could significantly impact the financials of these customers. The question always would remain that, do customers always keep paying even for the mistakes…[Read more]
-
Donald Hoxhaj wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 6 months ago
United States has recently seen cyber-attacks on 7 natural gas pipeline operators. The attackers targeted 3rd party communications system Latitude Technologies. The result was that several services broke down. […]
-
Donald Hoxhaj wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 6 months ago
One of the reports published by FireEye says that many Indian companies are subjected to cyber-attacks and are quite repetitive. Out of all the industries, Education and Telecommunication industries have been the […]
-
Donald Hoxhaj wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 6 months ago
Ashely Wearne, the head of Cyber Security group Sophos, recently said that current game plan against digital lawbreakers is to hit them smart, hit them fast, and hit them early.
With the advent of the […]
-
Donald Hoxhaj wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 6 months ago
Brute force attacks have become quite common in Carolina. The way a brute force works is by identifying the IP address of the system and then attempts to take control of the system by using a virtual […]
- Load More