WhatsApp New Privacy Policy

WhatsApp New Privacy Policy Started from 15th May

16th May 2021, Kathmandu WhatsApp Messenger is a free messaging app available for Android and smartphones which allows users to send text messages and voice messages, make a voice call, video calls,...
Hacking Techniques

10 Most Powerful Hacking Techniques You Must Know

15th May 2021, Kathmandu Hacking is the unauthorized access to or control over computer network security systems for some illicit purpose. Hacking means compromising computer systems, personal accounts, computer networks, or digital...
Cybercrime

Cybercrime Strongly Affected By The Covid-19 Pandemic

15th May 2021, Kathmandu Cybercrime is a criminal activity that either targets or uses a computer, a computer network, or a network device. Cybercrime may threaten a person, company, or a nation's...
DarkSide Wanted Money

DarkSide Wanted Money, Not Disruption from Colonial Pipeline Attack

13th May 2021, Kathmandu The colonial pipeline ransomware cyber attack forced the company to shut down operations and freeze IT systems. The FBI officially verified that DarkSide was responsible for compromising Colonial...
GitHub Passwords

GitHub Prepares to Move Beyond Passwords

13th May 2021, Kathmandu Github, a platform that provides internet hosting for software development and distributed version control, uses Git over SSH as supporting security keys. Kevin Jones, the Github security engineer, said...
European Rival Glovo by Hackers

Cyber Attack on Amazon’s European Rival Glovo by Hackers

12th May 2021, Kathmandu Hackers gained unauthorized access to Glovo. Just a month ago, Glovo announced a $530 million investment to create itself as Europe's Amazon. An e-commerce platform like Amazon delivers everything...
Cloud vs. On-Premises Security

Is the Cloud Really Less Secure than On-premises?

10th May 2021, Kathmandu Many years ago, cloud computing rolled onto the enterprise scene, hopefully, a new way of computing supporting an organization’s infrastructure, running applications. It’s been long, hard lumber to receive,...
Service Desk Reset Passwords

How Should the Service Desk Reset Passwords?

10th May 2021, Kathmandu Now and then, when employees forget passwords, they call the service desk to change or reset them. The help desk does other tasks too, but the average help...
Secure Browsing

How to Update Web Browsers for Secure Browsing

10th May 2021, Kathmandu The World Wide Web accessing software application also known as web browsers or simply “browser” is used to access and view websites through internet. Some of well-known browsers...
Security Updates from Google

Four Major Privacy and Security Updates from Google

10th May 2021, Kathmandu An American multinational technology company specializes in Internet-related services and products, including online advertising technologies, a search engine, cloud computing, software, and hardware also known as Google has...
Cloud Computing Security

Cloud Computing Security Vulnerabilities and What to Do

7th May 2021, Kathmandu Cloud vulnerability (Cloud Security Monitoring - Reduce Hours of Vulnerability) Many organizations are continuously trying to establish on cloud nowadays, which is one of the most important reasons why...
DDOS Attack Nepal

Nepal DDOS Attack Trends & How You Should Respond

5th May 2021, Kathmandu Digital Network Solutions is all set to organize DDOS Attack trends in Nepal and How we should respond to the webinar on 12th May 2021 from 11 a.m. The...
Kerberos KDC Vulnerability

F5 BIG-IP Found Vulnerable to Kerberos KDC Vulnerability

30th April 2021, Kathmandu F5 Networks this week released patches to address an authentication bypass vulnerability affecting BIG-IP Access Policy Manager (APM), but fixes are not available for all impacted versions. “The KDC...
REDDIT MAIN LOGO

Case Against REDDIT For Not Removing Child Sexual Abuse Material

27th April 2021, Kathmandu One female has filed a case against Reddit. She blamed her ex-boyfriend for posting her 16 years old porned photo time and again. The issue applies to controversial measures...
Chrome Zero-Day

Chrome Zero-Day Exploit Posted on Twitter

27th April 2021, Kathmandu The term “Zero-day” is an imaginative time, as this type of cyberattack happens in less than a day since the awareness of the security flaw. Thereby, not giving...
Zero Trust

Zero Trust: The Mobile Dimension

27th April 2021, Kathmandu Hank Schless, senior security options manager at Lookout, discusses how to secure remote performing through mobile gadgets. Hank Schless, is senior security answers manager at Lookout. Soon after embarking...
Saint Bot

Saint Bot – A New Malware Downloader Spotted

25th April 2021, Kathmandu With the rapid technological advancement in the cybercrime realm, attackers are coming up with new ways of quickly developing and deploying sophisticated malware. Recently, security researchers identified a...
TV tech loophole

THE smart TV tech loophole allowed miscreants to view private YouTube videos

25th April 2021, Kathmandu Smart TV Tech Loophole Allowed Miscreants to View Private YouTube Videos. Security researcher earned a $6,000 bug bounty after uncovering a set of web security flaws that allowed attackers to...
Apple macOS TextEdit

Apple macOS TextEdit Parsing Flaw leaked local Files via Dangling

25th April 2021, Kathmandu Apple macOS TextEdit parsing flaw leaked local files via dangling markup injection UPDATED A vulnerability in macOS allowed attackers to execute malicious HTML on TXT files which, if opened by...
Vulnerabilities

Vulnerabilities in Single Sign-On Services Could be Abused to Bypass Authentication

25th April 2021, Kathmandu Vulnerabilities in Single Sign-On services could be abused to bypass authentication controls A category of vulnerability detected in a number of Single Signal-On (SSO) companies may enable attackers to...
Cyber Warfare

Cyber Warfare: The Battle Tact of the Digital Age

25th April 2021, Kathmandu As cyberattacks continue to bypass even the tightest cybersecurity measures, the impact on consumers is reaching new heights – and investors are feeling the pressure Cyberwarfare is a computer-...
Vulnerability Remediation

Is Automated Vulnerability Remediation the Answer?

25th April 2021, Kathmandu Executing a well-run vulnerability management program is essential to protecting against data breaches and ensuring the availability of your IT infrastructure. What is your mean time to remediate...
EC-Council Certification Exams

CEH and Four Other EC-Council Certification Exams Earn College Credit

25th April 2021, Kathmandu EC-Council is pleased to announce five certifications that recently received approval from the American Council on Education (ACE). This is a major step to help jump-start college careers as well as...
Prometei Botnet

Prometei Botnet Exploiting Unpatched Microsoft Exchange Servers

25th April 2021, Kathmandu Attackers are exploiting the ProxyLogon Microsoft Exchange Server flaws to co-opt vulnerable machines to a cryptocurrency botnet named Prometei, according to new research. "Prometei exploits the recently disclosed Microsoft...
Hackers Exploit VPN

Hackers Exploit VPN to Deploy SUPERNOVA malware on SolarWinds Orion

25th April 2021, Kathmandu The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed details of a new advanced persistent threat (APT) that's leveraging the Supernova backdoor to compromise SolarWinds Orion installations...
Password Resets Add Up

Cost of Account Unlocks, and Password Resets Add Up

There are many labor-intensive tasks that the IT service desk carries out on a daily basis. None as tedious and costly is resetting passwords. Modern IT service desks spend a significant amount...
IOT Security Controls

5 Fundamental But Effective IoT Device Security Controls

25th April 2021, Kathmandu Matt Dunn, the associate managing director for cyber-risk at Kroll, discusses how to keep networks safe from insecure IoT devices. As the pandemic continues to fuel the shift to...
Cyberthreats loom

Cyberthreats Still Loom Over E-learning Platforms

24th April 2021, Kathmandu E-learning or electronic learning, Is the delivery of learning and training through digital resources or devices such as computers, tablets, and even cellular phones that are connected to...
API Risks

API Risks: What are They and How to Manage Them

24th April 2021, Kathmandu API security risks are a common problem in today’s cyber world. Unfortunately, cyberattacks have become an everyday word in today’s vernacular. Like any software, APIs can be compromised...
Malvertising Mayhem

Everything You Need to Know About the Malvertising Mayhem

Everything You Need to Know About the Malvertising Mayhem What is Malvertising? Malvertising is a pet name for malware that’s delivered through online advertising techniques. The ads look authentic. Often, legitimate third-party marketing companies distribute...