-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
AI, machine learning new tools to fight cyber-attacks: Internet security firm
This article talks about the following: In order to prevent cyber-attacks, the new help for all cyber security companies is Machine […] -
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
AWS S3 ‘Misconfiguration’ Opens Door to MITM Attacks
This article talks about the following: According to recent research, one of Amazon’s web service data storage has a security flaw and this has been ident […] -
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
Akamai Finds Web App Attacks Increased in Q3 2017
This article talks about the following: As per Akamai’s Internet Security report, Web application attacks have grown in Q3, 2017 and SQL Injection accounts for 4 […] -
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
Why web application attacks are a growing threat to the cloud
This article talks about the following: Web application are becoming a growing threat to cloud systems. It is found that 73% of the cloud attacks are […]-
Donald,
I don’t think that our phones and personal devices will be the biggest threats in the future. There have all our personal information such as photos, locations, and our contacts. I do believe that so many non trusted applications can be the main source to attack those devices. The problem is they can’t provide a patching and they are not tested by Apple or Samsung.
-
-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
Injection Attacks: The Least Glamorous Attack Is One of the Most Threatening
This article talks about the following: Research says that Injection attacks are the most common form of attacks in organizational […] -
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
Web App attacks up 69%, US main source of cyber attacks
This article talks about the following: The rate of growth in web application attacks have grown substantially over the last few years. Akamai Q3 State of […] -
Donald Hoxhaj commented on the post, Discussion Week 8, on the site 6 years, 12 months ago
Hi Neil,
I agree with what you said that Pandemics such as Flu and smallpox are definitely a threat, but a big threat that organizations need to concerned of. In fact, Small Pox and Flu rarely happen. I was reading the article and it says that Flu percentage in the United States has dropped drastically. All that organizations need is to have…[Read more] -
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Equifax blames known web app glitch for hacking
This article talks about the following: Equifax, one of the biggest US credit reporting agency, has reported cyber-attacks and this is likely to amplify criticism […] -
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Hackers Steal Almost 250,000 Web Logins each Week: Google
This article talks about the following: Google has discovered that there are millions of credentials of users that have been compromised through hacking […] -
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
SANS Las Vegas 2018 Security Training to Feature Advanced Web Application Penetration Testing
This article talks about the following: We application attacks have grown over the last few years, especially because […] -
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
McAfee’s own anti-hacking service exposed users to banking malware
This article talks about the following: McAfee, one of the largest security companies that builds protection software, failed to successfully […] -
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
New Ursnif variants silently targets banks and employ redirection attacks
This article talks about the following: The recent attacks on Australian banks has alarmed consumers and this has been attributed to New […]-
Donald,
This new Ursnif will be another breach that will be added to previous ones. These banks really need to work harder and improve themselves to be able to protect us and our sensitive information. I am so disappointed about the small efforts these banks do. I feel we are not protected anymore and actions need to be executed such as investing in IT security departments.
-
-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Ransomware, malware attacks to continue in 2018 as hackers advance to machine learning, analytics
This article talks about the following: Despite new standards in security and advanced sophistication in server […]
-
Donald Hoxhaj commented on the post, Bitcoin Wallet "hacked" by using information broadcast in interview, on the site 7 years ago
Fraser,
Your article is quite interesting and upon reading I was actually shocked to see such threats possible. You are right when you say that Information should not be disclosed publicly, but practically it is impossible for high profile people to not disclose or hide everything. The Image correction of QR code hacking is pretty shocking…[Read more] -
Donald Hoxhaj commented on the post, Hackers Recover Encryption Key With DUHK, on the site 7 years ago
Richard,
Thanks for sharing your views on this article. Hard Coding keys has been a threat for a long time now, not only with respect to VPN, but also with Online Banking, Payment systems, and Credit Cards. With the new cryptographic vulnerability of the DUHK, it would be interesting to see how much can this be prevented in the shortest time…[Read more] -
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
The Equifax hacks are a case study in why we need better data breach laws
This article talks about the following: The systems of Equifax, one of the largest credit reporting agencies in the world, was hacked […]
-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Singapore wants ethical hackers to get a license, or else
This article talks about the following: With the recent advancements in Information Security in Singapore, it has become a mandate by the government to […]
-
Well there are already certification tests that ethical hackers can take to become licensed but what Singapore is doing I think is valid except about the jail time and fines. They should have a registry and keep track who is licensed and who’s not but I do like this idea.
-
Hi Donald:
Great post. I think the Singapore government is tend to track those who have the hacking skills and limit their ability. However, I really don’t think getting certification for people will stop they hacking other government systems.
-
I wont take any license. If any country wants hacker to take license, maybe its time to show what animal means. it will push some people exposure themselves. If i am a citizen of Singapore and i have a very skillful hacker, i will burn the whole country up..
-
Donald,
Interesting post that talks about something completely new which is making Ethical Hackers in Singapore licensed if they have the right requirements such as academic education. I think, it is a good step to regulate this field and have an idea about what these ethical Hackers do. As a response to Neil’s comment, I believe that Singaporean’s government is trying to protect this field and make it hard for Hackers to do someone that may harm people in the country, this is why the jail time and fines can be very good for those who want to do something illegal.
-
-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Medical device makers wake up to cyber security threat
This article talks about the following: Medical Industry is one of the most crucial and vulnerable industries to security threats and the results of which […]
-
Donald.
I do believe that these companies that manufacture Medical Devices should work on the security part in parallel with developing new once to help people lives. I am saying this for the following reasons:– Security has to be guaranteed when you integrate software to these devices, especially that most of them are connected tirelessly and can be easily reached.
-These devises can put so many people lives under risk especially some of them controls some important organs such as Cardiac Devices that manage the heart beats of the heart.
-
-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Middle market businesses fail ethical hacking test
This article talks about the following: Upskilling the employees on Cyber Threats and Data Prevention has been a huge challenge for organizations. It is said […]
-
Donald Hoxhaj commented on the post, Attack of the Hack Back, on the site 7 years ago
Jonathan – Your article is an eye opener to the true definition of Ethical Hacking itself. It would be surprising to see such legislation practiced that allows people to hack a person who is hacking into you. I think that is not a bad idea after all because as long as people have the right tools and techniques that prevent them from such external…[Read more]
- Load More