All Activity

This stream auto-updates     

  1. Yesterday
  2. Manks

    new to cyberdoor

    I'm into rainbow six siege, and some dota 2 currently. They're pretty good time consumers when i'm bored 😜
  3. David

    new to cyberdoor

    Hi Manks! Welcome to CyberDoor. As a fellow college student, I can relate to your gaming side. What kind of games do you play? If you ever need anything, please feel free to reach out.
  4. Last week
  5. Manks

    new to cyberdoor

    hey everyone, im new to the community and thought at the very least I should post a introduction thread! My name is manks, I'm a college student who plays video games, and enjoys exploring forests hope we all get along, and hope to see ya future posts!
  6. Hi everyone! We are currently undergoing some pretty large changes (I feel like we constantly are). We are currently aiming to integrate a commerce area where users and small businesses could sell products on our site. Additionally, we are also going to be pushing towards providing the community with guides and resources towards marketing and maintaining their finances. I really think it's important to keep everyone in the loop as we make changes. So today, I am pleased to offer a roadmap of our journey. If you noticed, there is now an area titled "Careers and Opportunities." This area will serve as a job posting for jobs / internships with CyberDoor. We want creative and innovative minds to work with us. We'd love some feedback as to the direction you see CyberDoor going and what you think could be improved / implemented to make your experience better. We've temporarily disabled Awards and our Member Shop due to some revamping of their purpose. We are currently looking for a few roles under our careers tab. If you're interested in any of those roles or wish to participate, please reach out! I am eager to speak to people! With that being said, I want to reiterate that our cybersecurity portion of our site is not going anywhere. We will continue to create content in that area and engage the community there. As we grow, I am also going to be seeking out members that are specific to security and consumer protection. These employees will be specific to our cyber area and focus on innovation within that area. I am extremely excited to see where this takes us and am so excited to share our ideas with you, the community. Please let me know if you have any questions. If you have a product or suite you wish to showcase here, please, please reach out. We'd love to consider it and review the product. Respectfully, David
  7. In a David-and-Goliath moment, the 49-year-old librarian has won satisfaction in the wake of its head-spinningly massive 2017 data breach. Click here for the complete article.
  8. The Feds say Marcus Hutchins is behind both the UPAS Kit backdoor and the Kronos banking trojan. Click here for the complete article.
  9. While other malware families have been searching for new overlay techniques for Android 7 and 8, MysteryBot appears to have found a solution. Click here for the complete article.
  10. David

    Software Developer

    Places: 2

    Applicants: 2

    Brief Description: Our software developers are people who are interested in creating and developing content to help consumers and enterprise companies with their problems. Our goal with our software developers is to innovate and inspire you to create and collaborate with all team members of CyberDoor. Responsibilities: Create and implement front facing applications that impact user interaction. Design back-end solutions for e-commerce integration and enterprise companies. Communicate with Administrators and Supervisors on future projects and ideas Team Meetings with full team on ideas and the future of CyberDoor. Requirements: Passion to learn and engage with like minded people. Eagerness to adapt to a constantly changing field. Be prepared for unexpected challenges and be ready to push yourself to new limits. Work a minimum of 5 hours per week.
  11. The move escalates tensions between the phone giant and federal law enforcement when it comes to mobile security. Click here for the complete article.
  12. World Cup travelers should leave their mobile phones, laptops and tablets behind. Click here for the complete article.
  13. How can we keep up with the social media threat landscape as it grows to include more malware, hacks and scams? We discuss on the latest Threatpost podcast. Click here for the complete article.
  14. Researchers said over a dozen malicious docker images available on Docker Hub allowed hackers to earn $90,000 in cryptojacking profits. Click here for the complete article.
  15. Researchers said over a dozen malicious docker images available on Docker Hub allowed hackers to earn $90,000 in cryptojacking profits. View the full article
  16. A draft document lays out its criteria for addressing various flaws and notes the exceptions. Click here for the complete article.
  17. The bugs include a reflected cross-site scripting glitch and a cross-site request forgery vulnerability. Click here for the complete article.
  18. The wiper malware affecting 9,000 workstations and 500 servers inside Chile’s largest financial institution turns out to have been a distraction. Click here for the complete article.
  19. Dixons Carphone said it discovered a massive cyberattack on its processing systems that targeted millions of payment cards and personal data records. Click here for the complete article.
  20. One of the most serious issues is a critical remote code execution vulnerability in the Windows DNS, which could allow an attacker to take full control of the targeted machine. Click here for the complete article.
  21. Vendors have been shipping Android products with Android Debug Bridge enabled, making them attractive targets for hackers. Click here for the complete article.
  22. Malware can to worm its way onto Macs thanks to a recently discovered code-signing bypass flaw. Click here for the complete article.
  23. David

    Social Media Specialist

    Places: 2

    Applicants: 1

    Brief Description: Our social media specialist work across all social media platforms. Engaging with consumers and clients on social media, our social media specialist will have a strong understanding of our business core values and relay that to potential clients. Additionally, you will be a front facing partner working on showcasing CyberDoor in the brightest light. Responsibilities: Promote website content on social media platforms. Engage with users through all social media outlets. Research business specific ideas and relay unique, relevant content to social media platforms. Share progress bi-weekly with Administrators and Supervisors on-site. Have team meetings weekly to collaborate on solutions. Requirements: Passion to learn and engage with like minded people. Eagerness to adapt to a constantly changing field. Be prepared for unexpected challenges and push yourself to new limits. Work a minimum of 5 hours per week.
  24. The operation also resulted in the seizure of nearly $2.4 million and the recovery of about $14 million in fraudulent wire transfers, said the FBI. Click here for the complete article.
  25. David

    Financial Contributor

    Places: 2

    Applicants: 0

    Brief Description: A financial contributor intern is someone who we believe can produce quality content on CyberDoor’s financial areas. Financial contributors will produce financial advice to our consumer base and be a public facing member of our team. Here at CyberDoor we are constantly innovating to continue to advance amongst our competitors. We aim to consistently provide you a quality experience with both our solutions and our services. Responsibilities: Research critical financial areas that consumers are interested in. Post content twice a week pertaining to finances and financial literacy. Answer questions in the community forums regarding personal finance and investments. Share progress bi-weekly with Administrators and Supervisors on-site. Have team meetings weekly to collaborate on solutions. Requirements: Passion to learn and engage with like minded people. Eagerness to adapt to a constantly changing field. Be prepared for unexpected challenges and push yourself to new limits. Ability to work 5 hours minimum a week.
  26. Earlier
  27. Researchers found three vulnerabilities in Foscam connected security cameras that could enable a bad actor to gain root access knowing only the camera’s IP address. Click here for the complete article.
  28. With a nest full of spy capabilities and good hiding techniques, the InvisiMole was able to tunnel under the radar for at least five years.” Click here for the complete article.
  1. Load more activity