vulnerability

WhatsApp logo

Flaw in WhatsApp Web app puts 200 million users at risk

Security researchers from Check Point claim that a flaw in the Web app version of WhatsApp could put as many as 200 million users at risk. The “MaliciousCard” vulnerabilities could enable an attacker to assume complete control of the victim’s […]

Flaw in WhatsApp Web app puts 200 million users at risk Read More »

hospital operating room

How can hospitals protect their medical equipment from malware?

The challenges in protecting hospitals from cyber attacks are very similar to those faced in ICS and SCADA environments; the equipment used in hospitals is not user-serviceable and therefore often running out-of-date software or firmware. This creates a dangerous situation

How can hospitals protect their medical equipment from malware? Read More »

Glossary of Internet and technology terms

Flaw

Definition: A flaw can refer to either a Bug, in the case of a flaw in the actual code of an application or operating system, or a flaw could be a vulnerability, in the case of a weakness or oversight

Flaw Read More »

Glossary of Internet and technology terms

Exploit

Definition: An exploit is a term used to describe an attack against a specific vulnerability. The attack “exploits” or takes advantage of a certain vulnerability in order to compromise a target system in some way.

Exploit Read More »

Glossary of Internet and technology terms

Bug

Definition: In computer technology, a bug is a coding error in a computer program. After a product is released or during public beta testing, bugs are still apt to be discovered. When this occurs, users have to either find a

Bug Read More »

Scroll to Top