search expand
Skip to content
Security Zap

Security Zap

Cyber Security Done Right – Find out more about cyber security, internet safety, cyber crime, deep web, cyber attack and network security.

  • Security News
  • Cyber Attacks
  • Malware
  • Vulnerabilities

China Develops Devastating Cyber Weapon – Chinese Cyber Attacks

Posted on May 19, 2015September 23, 2015 by Security Zap

According to the annual report of DoD China is close to developing another cyber weapon capable of unplugging internet jack from an entire nation’s infrastructure….

Posted in Cyber AttacksTagged china, china cyberwarfare, chinese cyber attacksLeave a Comment on China Develops Devastating Cyber Weapon – Chinese Cyber Attacks
malware

Document Based Malware Software Tool – Microsoft Word Intruder

Posted on May 18, 2015September 23, 2015 by Security Zap

Microsoft Word Intruder According to nakedsecurity the new tool Microsoft Word Intruder or MWI allows anyone to develop a high level malware software. It is thought…

Posted in Malware, Security NewsTagged malware, malware software, malware tool, microsoft word vulnerabilityLeave a Comment on Document Based Malware Software Tool – Microsoft Word Intruder
venom vulnerability

VENOM Vulnerability

Posted on May 18, 2015December 31, 2015 by Security Zap

What is Venom Vulnerability? VIRTUALIZED ENVIRONMENT NEGLECTED OPERATIONS MANIPULATION or VENOM vulnerability has been uncovered by crowdstrike. According to senior security researcher Jason Geffner this…

Posted in Security News, VulnerabilitiesTagged data center, floppy disk controller, venom vulnerabilityLeave a Comment on VENOM Vulnerability
cyber attack

Cyber Attack on Bundestag

Posted on May 16, 2015May 17, 2015 by Security Zap

According to Spiegel the national parliament of Germany, Bundestag, has been targeted by a major cyber attack allowing unknown perpetrators to penetrate internal network. According to…

Posted in Cyber Attacks, Security NewsTagged bundestag, cyber attack, data breach, germany1 Comment on Cyber Attack on Bundestag
network security policy

How to Create a Network Security Policy?

Posted on May 16, 2015March 31, 2016 by Security Zap

Introduction Network security policy is a document describing company’s strategy towards maintaining confidentiality, integrity and availability (CIA) of network assets. It is one of the…

Posted in GeneralTagged network security, risk assessment, security policyLeave a Comment on How to Create a Network Security Policy?
cyber space of iran

Cyberspace and Cyber Warfare Capabilities of Iran

Posted on May 14, 2015December 31, 2015 by Security Zap

Introduction Internet is probably the most valuable asset for billions of people all around the world. It plays key roles in our social life, governance,…

Posted in Cyber AttacksTagged cyber capabilities, cyber space of iran, cyber warfareLeave a Comment on Cyberspace and Cyber Warfare Capabilities of Iran

Posts navigation

Previous 1 … 104 105 106 Next

Search

Recent Posts

  • The Digital Battlefield: Common Types of Cyber Threats Exposed
  • Learn the Risks of API Vulnerabilities
  • Introduction To Cybersecurity
  • Movies2Watch: Stream Safely and Legally – Explore the Best Alternatives
  • Cybersecurity in the Age of Remote Work: Best Practices for Businesses
security zap logo

All Rights Reserved. © Copyrights 2020 SecurityZap.com

Pages

  • About Us
  • Privacy Policy and Terms of Service
  • Sitemap
  • Sitemap
  • Privacy Policy and Terms of Service
  • About Us