Monthly Archives: April 2016

­

German Nuclear Power Plant Infected With Malware

A German nuclear power plant near Munich reportedly was found infected with malware. RWE, the German utility that runs the facility, has confirmed that since the plant is cut off from Internet, the malware infection did not affect or harm operations, according to Reuters. Conficker and W32.Ramnit malware were discovered in unit B of the

Qatar National Bank hit by cyber attack; 1.4GB file archive leaked online

Qatar National Bank, the largest lender in the Middle East and Africa by assets, is investigating an alleged security breach of data posted online this week that revealed the names and passwords of a large number of customers. Qatar National Bank is probing reports of an online leak of confidential data of a large number

April 28th, 2016|Cyber Security, Security NEWS|

It looks like Spotify was hacked – change your password ASAP, if you still can

If you’re one of the millions of people around the world who count themselves as Spotify users, we have some troubling news: it looks like Spotify recently suffered a security breach. A list containing hundreds of sets of account credentials was published late last week to popular anonymous text file sharing site Pastebin, and several of

Pavankumar Bolisetty, the Founder of E Com Security Solutions, Wins Infosec Maestro Award at the All India Infosec Maestro Conference Summit, 2016.

India's best ethical hacker and an Indian entrepreneur, has been recognized with the InfoSec Maestro Award along with being named a winner among Top CISO's of India in 2016 at the All India Infosec Maestro Conference summit. Pavankumar Bolisetty, one of India's best ethical hacker and an Indian entrepreneur, and extremely well known in the

April 16th, 2016|news|

CBS Sports App, Mobile Site Left Millions of Users’ Personal Data Exposed

CBS recently fixed a vulnerability in its popular Sports application that could have exposed users to man-in-the-middle attacks and inadvertently leaked personal data. According to researchers, upon registration, users’ names, email addresses, account passwords, dates of birth, and zip codes were all sent over an unencrypted connection, in cleartext, to the app’s servers. Both the Android

FBI Cyber Warning: Ignore Your CEO’s E-Mail And Phone Her Back — Or Your Company May Pay For It

The FBI is warning people about a business email scheme which has resulted in huge losses to companies in Phoenix and other U.S. cities. Here’s how the scam works: A CEO seemingly emails an employee — typically in a finance or administrative role — instructing them to perform a wire transfer. The employee follows directions

What is two factor authentication?

You may have heard the term ‘two-factor’ or ‘multi-factor’ authentication. If you haven’t heard of these terms, chances are you’ve experienced this and not even known it. The interesting thing is that two factor authentication is one of the best ways to protect your accounts from being hacked. So what exactly is it? Well traditional

April 11th, 2016|Web Application Security|

PwC Report Shows Cybercrime in the UK is Growing Rapidly

In the latest edition of their Global Economic Crime Survey, PricewaterhouseCoopers have announced a finding of a 20% increase in cybercrime, making it the fastest growing category of economic crime. The UK seems to be the most severely affected, with 55% of organisations being affected by some type of cybercrime, higher than the US which

April 5th, 2016|Cyber Crime|

Six Best Practices for Security Testing in the SDLC

Even if an application has been built following security and defensive coding best practices, it will still require significant testing before it's ready for release. Whether this is routine testing for common vulnerabilities or security-focused penetration testing to pick up on the types of problems that often slip through the cracks, following security best practices