-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
Cyber attacks a threat to Scottish businesses
This article talks about the following: Statistics says that over 200, 000 organizations were impacted because of WannaCry attacks in May and this impact has also […]
-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
Remarkable increase in uptake of cybersecurity courses: Pluralsight
This article talks about the following: Cyber Security has become a necessity in today’s world where data is growing at an exponential rate a […]
-
Donald Hoxhaj commented on the post, Flash Zero Day Exploit used to Distribute FinSpy, on the site 6 years, 11 months ago
Richard – Your response raises attention to the most important and widely used enterprise and personal software i.e. Adobe Flash and Microsoft Office. Both these are widely used and in fact more than 55% of consumers worldwide use them for their everyday use. Most of these malwares are embedded in Office documents, which people do not realize and…[Read more]
-
Donald Hoxhaj commented on the post, Small Companies Often in the Dark About Cyberattacks, on the site 6 years, 11 months ago
Elizabeth – Your response to Cyber-attacks on SMEs is quite interesting to read. I have to agree that SMEs definitely face a lot of challenges because of lack of resources, poor understanding of cyber security threats, and lack of capital to invest in such measures. One interesting aspect that I found in your response is the fact that the recovery…[Read more]
-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
SMEs more vulnerable than ever to cyber attacks, survey shows
This article talks about the following: Cyber-attacks have become a growing threat in the United States and UK and this has factored primarily […]
-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
Iran to blame for cyber-attack on MPs’ emails – British intelligence
This article talks about the following: In June 2017, the email accounts of many MPs were compromised and this blame has been put on Iran. W […]
-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
Over Two-Thirds of SMBs Lose Money In Cyber Attacks: BBB
This article talks about the following: This is a survey conducted on more than 2000 businesses by BBB. The results from the discussion with respondents […]
-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
Adobe patches Flash bug used for planting spying tools
This article talks about the following: Adobe Flash, one of the widely used, for viewing content recently got compromised and hackers found way of […]
-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
Major Wi-Fi security flaw could allow hackers to listen in on any of your devices
This article talks about the following: Wireless systems have been the talk of most security professionals in the world. The […]
-
Hi Donald,
Interesting article you posted. However, this news does not surprise and this has been mentioned multiple times before. At this point, I think most technology is not 100% safe from hackers. The best that can be done is implementing security to defend the hacks. Additionally, for any technology currently out there or being developed, hacking and security should be an instant thought. I think it is safe assumption to say that anything (tech wise) has the possibility of being hacked and nothing is safe.
-
Donald,
It’s became very risky to have all these devices that work tirelessly at our homes. I believe as Elizabeth mentioned this is a very normal thing to happen especially when you deal with protocols we use at home that can be easy to break. In my opinion, it will be interesting to see new technologies that will help us to secure our home devices such as developed firewalls which can help to filter traffics. I don’t agree with Elizabeth about this part of her post where she talk about how well these home devices are protected, I do believe that there is always a way that hackers can find to have a full or some access to them which means causing hams to our lives.
Thank you for sharing this article with up, It’s good to know about the failure of the WPA2 security protocol in our wireless at homes which can cause us harms.
-
-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
Making the Lives of Cybercriminals and Spies Harder Online
This article talks about the following: Nicole Perlroth, one of the cybersecurity reporter for The Times throws insights into how cyber theft can be […]
-
Donald Hoxhaj commented on the post, 5 worst cybersecurity habits with catastrophic consequences, on the site 6 years, 11 months ago
Amanda – That’s an interesting article and definitely a good summary by you. It gives a lot of information about common habits when dealing with cybersecurity. Out of all the 5, I was personally able to relate No Data Backups as one of the worst habits I could have because I sometimes fail to do data backups on a constant basis. I wonder what w…[Read more]
-
Donald Hoxhaj commented on the post, Hacking the election: security flaws need fixing, researchers say, on the site 6 years, 11 months ago
Jonathan – This is indeed a topic of concern because transparent elections are the backbone of any economy. With the research talking about how the voting machines of 2016 elections could have been compromised, your article definitely throws light on the threat that these machines pose. What is interesting to note from the article is that how will…[Read more]
-
Donald Hoxhaj commented on the post, U.S. Asks China Not to Enforce Cyber Security Law, on the site 7 years ago
Jonathan – Very interesting article. In the article, the following was mention “Washington has asked Beijing to refrain from enforcing a new cybersecurity law that would require foreign and domestic companies to store user data in China and submit to security checks, saying such measures would damage global trade.”. Which means that the new laws…[Read more]
-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Amazon’s Whole Foods Market Suffers Credit Card Breach In Some Stores
This article talks about the following: Whole Foods Market was acquired by Amazon for 13.7 billion in late August, Whole Foods Market was […]
-
Fascinating article and I agree with you that it will be interesting to see how to eliminate the risk of the data breach in the future. Thank you for sharing.
-
Donald;
I feel that by now all the hackers have our sensitive information. After Target and Pizza Hut, this is the turn to Amazon’s Whole Foods Market Suffers Credit Card Breach In Some Stores which means so many customers lost already their credit card information including sensitive information such as Full names and Zip codes.Again, this is another issue that show how much these companies don;t care about their IT securities. They really need to invest on building stronger IT departments.
-
-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Apple macOS High Sierra Exploit Lets Hackers Steal Keychain Passwords in Plaintext
This article talks about the following: Apple rolled out a new version of its macOS operation system and a few hours before a […]
-
Donald Hoxhaj commented on the post, Splunk will expand its security tools with machine learning techniques., on the site 7 years ago
Joseph – Very interesting article. Based on the article Splunk purchase Caspida because of the surging corporate cybersecurity spending following numerous well-publicized breaches. The article, also mentioned that most of the high-profile breaches were due to compromised credential, which means that automated detection leveraging machine learning…[Read more]
-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Behind-the-Scenes Cryptocurrency Mining Discovered on Showtime Sites
This article talks about the following: Showtime is a premium television network that operates under CBS, Showtime networks has mined the […]
-
Donald Hoxhaj posted a new activity comment 7 years ago
Christie – Very interesting article. I found another article that supplements the one you posted. Initial, the article identifies the difference between Authentication and Authorization and then goes into detail on common security vulnerability mistakes. The article identifies the following common mistakes: Injection flaws, broken…[Read more]
-
Donald Hoxhaj posted a new activity comment 7 years ago
Ian – Very interesting article. I think, Navy did a great job by asking the people that operate the systems on a daily basis for their input. It’s definitely a cheaper alternative and more suited for the task but there are defiantly security concerns. Where will the controllers be developed? If, they are developed in China or any other cou…[Read more]
-
Donald Hoxhaj posted a new activity comment 7 years ago
http://www.technewsworld.com/story/84808.html
How Many Ways Might iPhone X’s Face ID Go Wrong?
This article talks about the following: face id debut was underwhelming as it failed to work as promised during the on stage demonstration, the iPhone X features a TrueDepth camera that allows the face id system to ensure that the face looking at…[Read more]
- Load More