vulnerability

WhatsApp logo

Flaw in WhatsApp Web app puts 200 million users at risk

Security researchers from Check Point claim that a flaw in the Web app version of WhatsApp could put as many as 200 million users at risk. The “MaliciousCard” vulnerabilities could enable an attacker to assume complete control of the victim’s …

Flaw in WhatsApp Web app puts 200 million users at risk Read More »

hospital operating room

How can hospitals protect their medical equipment from malware?

The challenges in protecting hospitals from cyber attacks are very similar to those faced in ICS and SCADA environments; the equipment used in hospitals is not user-serviceable and therefore often running out-of-date software or firmware. This creates a dangerous situation …

How can hospitals protect their medical equipment from malware? Read More »

Glossary of Internet and technology terms

Vulnerability

Definition: In network security, a vulnerability refers to any flaw or weakness in the network defense that could be exploited to gain unauthorized access to, damage or otherwise affect the network.

Glossary of Internet and technology terms

Flaw

Definition: A flaw can refer to either a Bug, in the case of a flaw in the actual code of an application or operating system, or a flaw could be a vulnerability, in the case of a weakness or oversight …

Flaw Read More »

Glossary of Internet and technology terms

Exploit

Definition: An exploit is a term used to describe an attack against a specific vulnerability. The attack “exploits” or takes advantage of a certain vulnerability in order to compromise a target system in some way.

Glossary of Internet and technology terms

Bug

Definition: In computer technology, a bug is a coding error in a computer program. After a product is released or during public beta testing, bugs are still apt to be discovered. When this occurs, users have to either find a …

Bug Read More »

Scroll to Top