10 Essential Network Vulnerability Scanning Tools

September 24, 2018
Thumbnail image for 10 Essential Network Vulnerability Scanning Tools

Network security is of prime importance in today’s world, hence network scanning, or rather network vulnerability scanning, has a crucial role to play as regards the overall security of any enterprise and the data that it handles. Here’s a look at the top 10 essential network vulnerability scanning tools available today: HackerCombat Network Security Scanner […]

Read the full article →

Hackers and Smartphone Vulnerabilities

June 14, 2017
Thumbnail image for Hackers and Smartphone Vulnerabilities

Because of flaws and vulnerabilities found in software, your smartphone is very susceptible to attacks from hackers. Unknowingly, you can download a seemingly harmless app and bring about malware, spyware, or viruses to your Android device. The most recent malware campaign that occurred, called Judy malware, was hidden amongst  roughly 40 apps found in the […]

Read the full article →

Twitter Cross Site (XSS) Vulnerability – Watch Out!

August 28, 2009
Thumbnail image for Twitter Cross Site (XSS) Vulnerability – Watch Out!

James Slater, IT developer with a British firm that specializes in search engine optimization, has found a security vulnerability in the social network, Twitter. The simple act of reading tweets online on could cause somebody to steal your login cookie and potentially get access to your Twitter account – or simply redirect you to […]

Read the full article →

iPhone SMS vulnerability allows eavesdropping

July 3, 2009

Wooops! Charlie Miller, OS X security expert, discovered a rather serious flaw in the SMS-part of the iPhone and presented his findings at the SyScan conference in Singapore recently. The hole in the SMS software allows for a remote person to run software code on the iPhone and monitor the location of iPhone using GPS, […]

Read the full article →