We Make Technology Work For You

Blog

Cisco Jabber for Windows STARTTLS Downgrade Attack | Threatpost | The first stop for security news

By on Jan 5, 2016 in Blog |

Source: Cisco Jabber for Windows STARTTLS Downgrade Attack | Threatpost | The first stop for security news   CISCO JABBER CLIENT VULNERABLE TO MAN-IN-THE-MIDDLE ATTACK by Michael Mimoso  January 5, 2016 , 7:54 am An attacker in a man-in-the-middle position could abuse a STARTTLS downgrade vulnerability in the Cisco Jabber client-server negotiation in...

Read More

How To Hide Apps On iPhone: Trick lets you hide default iOS apps | BGR

By on Jan 5, 2016 in Blog |

Source: How To Hide Apps On iPhone: Trick lets you hide default iOS apps | BGR   The iPhone trick you’ve been waiting for: How to hide Apple’s default apps By Zach Epstein on Jan 4, 2016 at 9:52 AMImage Source: Zach Epstein, BGR Since the iPhone was first released all the way back in 2007, there have been a handful of features that users asked for repeatedly...

Read More

Trains Vulnerable to Hacker Attacks: Researchers

By on Dec 30, 2015 in Blog |

By Eduard Kovacs on December 29, 2015 inShare66 A team of researchers has analyzed modern railway systems and they’ve determined that it would not be difficult for a motivated attacker to pull off a cyber “train robbery.” Sergey Gordeychik, Alexander Timorin and Gleb Gritsai of SCADA StrangeLove, a research group focusing on the security of ICS/SCADA systems,...

Read More