David

Administrators
  • Content count

    199
  • Joined

  • Last visited

  • Days Won

    2
  • Coins

    675 [ Donate ]

David last won the day on May 1

David had the most liked content!

Community Reputation

7 Neutral

About David

  • Rank
    CEO of CyberDoor

Recent Profile Visitors

122 profile views
  1. Simply put: are you getting the new iPhone? Why or why not? I personally am extremely excited to get the new iPhone. I am hoping for a iPhone X Plus. What are you expecting on the new models?
  2. The U.S. Senate gave the nod to restoring the 2015 Open Internet Order, putting net neutrality on the fast track to a House vote. Click here for the complete article.
  3. A type of card-not-present fraud is spreading throughout the Latin American underground, uniting groups of malefactors in a communal effort to perpetrate it as widely as possible. Click here for the complete article.
  4. Threatpost editors Tom Spring, Tara Seals and Lindsey O'Donnell discuss the week’s information security news. Click here for the complete article.
  5. A recently discovered malware steals cache data and messaging sessions from the desktop version of encrypted messaging service Telegram. Click here for the complete article.
  6. Researchers created a proof-of-concept attack that allows remote attackers to access protected APIs to extract credentials. Click here for the complete article.
  7. Researchers created a proof-of-concept attack that allows remote attackers to access protected APIs to extract credentials. View the full article
  8. The Sun Team APT, likely linked to North Korea, uses Google Play and Facebook as attack vectors. Click here for the complete article.
  9. David

    Net Neutrality - Status

    Something I've noticed is the push for VPN's has become so much stronger. It seems that VPN companies are providing users a friendly interface to integrate a VPN. Personally, I think VPN's are the first step to getting consumers aware of privacy and the rights they should have.
  10. An array of malicious Android apps purporting to be popular game Fortnite are instead harvesting call logs and downloading cryptomining malware. Click here for the complete article.
  11. A team of academic researchers has demonstrated that it's possible to possible to closely mimic legitimate voice commands in order to carry out nefarious actions on these home assistants. Click here for the complete article.
  12. The company urges customers to patch three vulnerabilities that received the highest severity rating of 10. View the full article
  13. The company urges customers to patch three vulnerabilities that received the highest severity rating of 10. Click here for the complete article.
  14. Threatpost talked to several security researchers about what's changed in the past year. Click here for the complete article.
  15. Deception technology is an emerging category of cyber defense that is particularly useful when it comes to IoT devices, SCADA systems and medical devices. Click here for the complete article.