Magazine

Your Source of Data
Security Alert: Processors Meltdown!

Security Alert: Processors Meltdown!

Hello, Recently multiple disclosed security vulnerabilities took the Internet by storm. Dubbed “Meldown” and “Spectre”, those vulnerabilities seem to affect numerous systems and processors including Intel, AMD, ARM; thus it has the potential to affect PCs, servers, networking equipment, mobile devices and even cloud. An attacker can exploit those vulnerabilities by running a special code locally...
Read More
Wifi is no Longer Secure - WPA2 got KRACKed !

Wifi is no Longer Secure – WPA2 got KRACKed !

On October 16, 2017, Mathy Vanhoef and Frank Piessens of imec-DistriNet published a paper detailing their discovery of security weaknesses in WPA2. WPA2 (Wi-Fi Protected Access II) is a widely used security protocol developed by the Wi-Fi Alliance for the purpose of  encrypting and securing the traffic on Wi-fi connections between the Wi-fi router and endpoints. WPA2 (and...
Read More
Lebanon Smart City Experience

Lebanon Smart City Experience

On Saturday 16th of September, 2017, Ogero in collaboration with Data Consult  launched the first smart city in Lebanon at BeitMisk. This project has been initiated by Ogero a few months ago, as part of its nationwide digital strategy. One of the objectives Ogero is aspiring to achieve, is to build a nationwide Internet of Things...
Read More
SNMP Remote Code Execution Vulnerabilities in Cisco IOS and IOS XE

SNMP Remote Code Execution Vulnerabilities in Cisco IOS and IOS XE

Summary: The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system...
Read More
WannaCry: A Massive Ransomware Outbreak

WannaCry: A Massive Ransomware Outbreak

WannaCry: What do you need to know?   Following the release of NSA hacking dumps by Shadow Brokers, blackhat hacker groups used 2017’s most famous Microsoft Windows exploit created by NSA’s “ETERNALBLUE” which takes advantage of a vulnerability in Windows SMB protocol. The hacker group behind WannaCry ransomware launched the largest cyber attack in years infecting...
Read More
1 2 3 4 7