search expand
Skip to content
Security Zap

Security Zap

Cyber Security Done Right – Find out more about cyber security, internet safety, cyber crime, deep web, cyber attack and network security.

  • Security News
  • Cyber Attacks
  • Malware
  • Vulnerabilities
malware

Document Based Malware Software Tool – Microsoft Word Intruder

Posted on May 18, 2015September 23, 2015 by Security Zap

Microsoft Word Intruder According to nakedsecurity the new tool Microsoft Word Intruder or MWI allows anyone to develop a high level malware software. It is thought…

Posted in Malware, Security NewsTagged malware, malware software, malware tool, microsoft word vulnerabilityLeave a Comment on Document Based Malware Software Tool – Microsoft Word Intruder
venom vulnerability

VENOM Vulnerability

Posted on May 18, 2015December 31, 2015 by Security Zap

What is Venom Vulnerability? VIRTUALIZED ENVIRONMENT NEGLECTED OPERATIONS MANIPULATION or VENOM vulnerability has been uncovered by crowdstrike. According to senior security researcher Jason Geffner this…

Posted in Security News, VulnerabilitiesTagged data center, floppy disk controller, venom vulnerabilityLeave a Comment on VENOM Vulnerability
cyber attack

Cyber Attack on Bundestag

Posted on May 16, 2015May 17, 2015 by Security Zap

According to Spiegel the national parliament of Germany, Bundestag, has been targeted by a major cyber attack allowing unknown perpetrators to penetrate internal network. According to…

Posted in Cyber Attacks, Security NewsTagged bundestag, cyber attack, data breach, germany1 Comment on Cyber Attack on Bundestag
network security policy

How to Create a Network Security Policy?

Posted on May 16, 2015March 31, 2016 by Security Zap

Introduction Network security policy is a document describing company’s strategy towards maintaining confidentiality, integrity and availability (CIA) of network assets. It is one of the…

Posted in GeneralTagged network security, risk assessment, security policyLeave a Comment on How to Create a Network Security Policy?
cyber space of iran

Cyberspace and Cyber Warfare Capabilities of Iran

Posted on May 14, 2015December 31, 2015 by Security Zap

Introduction Internet is probably the most valuable asset for billions of people all around the world. It plays key roles in our social life, governance,…

Posted in Cyber AttacksTagged cyber capabilities, cyber space of iran, cyber warfareLeave a Comment on Cyberspace and Cyber Warfare Capabilities of Iran
scada plc pls

Vulnerabilities in Industrial Control Systems – SCADA

Posted on May 14, 2015May 14, 2015 by Security Zap

Industrial Control Systems (ICS), operate the global industrial infrastructures, such as pipelines, nuclear stations, oil, electricity and much more. ICS comprises Supervisory Control and Data…

Posted in VulnerabilitiesTagged industrial control systems, plc, pls, scada, vulnerabilitiesLeave a Comment on Vulnerabilities in Industrial Control Systems – SCADA

Posts navigation

Previous 1 … 103 104

Search

Recent Posts

  • What You Need to Know for a Safe Web Browsing Experience?
  • Your Guide to Incognito Mode in 4 Internet Browsers
  • How To Set-Up A Cold Storage Bitcoin Wallet
  • What Is Shortcut Virus and How Can You Get Rid of It?
  • Firefox Lockbox for Android: How It Works and How to Use It
security zap logo

All Rights Reserved. © Copyrights 2020 SecurityZap.com

Pages

  • About Us
  • Privacy Policy and Terms of Service
  • Sitemap
  • Sitemap
  • Privacy Policy and Terms of Service
  • About Us