by | Jul 14, 2020 | Cloud Security, Security
Google is taking important steps to secure customer data in the cloud when used by applications and prevent potentially unauthorized access to sensitive computing workloads run by government institutions and their contractors. To meet the strict security and...
by | Jul 2, 2020 | Network Security, Security
A typical business network has at least one of them and probably more than the admins want to admit: a legacy server or workstation running an ancient piece of business software that you just can’t wean yourself off. If you are lucky, it’s on a virtual machine that...
by admin | May 13, 2020 | Security, Security Tools
AndroL4b is an android security virtual machine based on Ubuntu-mate includes the collection of latest framework, tutorials and labs from different security geeks and researchers for reverse engineering and malware analysis.Tools:Radare2: Unix-like reverse engineering...
by admin | May 8, 2020 | Privacy, Security
A variety of sensitive information has been there for the taking due to an unsecured cloud storage container Over 752,000 birth certificate applications have been exposed online by an unnamed company that enables people to obtain copies of birth and death records from...