According to the annual report of DoD China is close to developing another cyber weapon capable of unplugging internet jack from an entire nation’s infrastructure….
Document Based Malware Software Tool – Microsoft Word Intruder
Microsoft Word Intruder According to nakedsecurity the new tool Microsoft Word Intruder or MWI allows anyone to develop a high level malware software. It is thought…
VENOM Vulnerability
What is Venom Vulnerability? VIRTUALIZED ENVIRONMENT NEGLECTED OPERATIONS MANIPULATION or VENOM vulnerability has been uncovered by crowdstrike. According to senior security researcher Jason Geffner this…
Cyber Attack on Bundestag
According to Spiegel the national parliament of Germany, Bundestag, has been targeted by a major cyber attack allowing unknown perpetrators to penetrate internal network. According to…
How to Create a Network Security Policy?
Introduction Network security policy is a document describing company’s strategy towards maintaining confidentiality, integrity and availability (CIA) of network assets. It is one of the…
Cyberspace and Cyber Warfare Capabilities of Iran
Introduction Internet is probably the most valuable asset for billions of people all around the world. It plays key roles in our social life, governance,…