exploit

binary fingerprint Cylance

The bad guys are probably already inside your network

Organizations and IT security professionals spend a lot of time focusing on guarding against external threats–building up the defensive wall that keeps internal systems and data safe from outside attackers. Those efforts are all well and good, but miss the …

The bad guys are probably already inside your network Read More »

WhatsApp logo

Flaw in WhatsApp Web app puts 200 million users at risk

Security researchers from Check Point claim that a flaw in the Web app version of WhatsApp could put as many as 200 million users at risk. The “MaliciousCard” vulnerabilities could enable an attacker to assume complete control of the victim’s …

Flaw in WhatsApp Web app puts 200 million users at risk Read More »

Glossary of Internet and technology terms

Exploit

Definition: An exploit is a term used to describe an attack against a specific vulnerability. The attack “exploits” or takes advantage of a certain vulnerability in order to compromise a target system in some way.

Glossary of Internet and technology terms

Compromise

Definition: When used to discuss Internet security, it does not mean that two parties come to a mutually beneficial agreement. Rather, it means that the security of your computer or network is weakened. A typical security compromise can be a …

Compromise Read More »

Scroll to Top