Facebook Impersonation

ClickSSL Weekly InfoSec Snipper March 28, 2016

Facebook is going to introduce Alert for Facebook Impersonation To prevent online harassment especially for women users, Facebook is working on a feature that will inform users about cloned accounts according to Mashable. Cyber prowlers imitate Facebook users, do activities on their behalf unless
software bug

ClickSSL Weekly InfoSec Snipper March 21, 2016

Buhtrap Group has targeted Russian Banks Russian banks are on target of Buhtrap attacker group by applying spear phishing technique. According to Russian security IB group report, such phishing mails contains word file that enable spyware infection. After accessing the PC system, spyware can open
IT security audit

IT Security Audit: Best Practice to Perform Security Inspection

Company's networks share information and communicate in insecure environment, which are vulnerable to different attacks. Generally, information is shared on networks via email, attachment, network drives, which pose dangers as well. Not only outsiders but also insiders in organizations are responsib
Web Attacks by Toolkit

ClickSSL Weekly InfoSec Snipper March 14, 2016

Email Malware Rate is on rise, Symantec Intelligence says On the base of Global Intelligence Network (GIN), that collects the data on malware, spam, phishing, web attacks and mobile & social media has come up with February Intelligence report. The report is saying that email malware rate is h
wordpress plugins

ClickSSL Weekly InfoSec Snipper March 7, 2016

WordPress Plug-in "Custom Content Type Manager" is found with Backdoor Sucuri has unmasked wicket WordPress plug-in "Custom Content Type Manager" (CCTM) that can install backdoor and alter WordPress core files. Sucuri client informed Sucuri researchers when he found (auto-update.php) file while u
Project Shield DDoS Protection

ClickSSL Weekly InfoSec Snipper February 29, 2016

Top 10% of Top Alexa Websites are weak to CSRF Attacks A CloudFlare engineer (Mr. Johnson) found that around 10% of top Alexa sites are using incorrect Cross-Origin Resource Sharing (CORS) policy that exposed users to data theft. CORS is a technique that defines the role of server resources to be
vulnerability management

Rivet Vulnerability Management to Reduce Threats in IT System

Cyber-attacks are rapidly growing in number and in threat as far as modern day business environments are concerned. That is the reason why businesses are encouraged to keep an eye on the loopholes that may be leveraged for such attacks. Those cyber criminals only need small gaps to execute attack. I
norton symantec antivirus

ClickSSL Weekly InfoSec Snipper February 22, 2016

Norton Antivirus is the top line Antivirus-AV-Test Says AV-Test has published its research on best antivirus products, which is based on two categories: for users and for corporate users. Symantec has won two categories award with its Norton security antivirus program. While on performance base,