Skip to main content

Posts

Showing posts from April, 2020

Critical TikTok Flaw — Let Hackers Swap Your Videos

Tommy Mysk and Haj Bakry who are software developers found a critical flaw in the popular video-sharing TikTok app that allows hackers to modify and swap videos on any TikTok account. According to the analysis done by software developers, the TikTok app uses insecure HTTP to transfer its data . Because of this, the TikTok app's images and video transfer are unencrypted (in plain text). TikTok uses CDNs to transfer its data over HTTP. So, if a hacker act as Man-in-the-Middle between the TikTok app and TikTok's CDNs then a hacker can fetch the details of all the videos that a user has watched and downloaded in plain text . By the Man-in-the-Middle attack, it is possible for an attacker to modify the data in transmission and swap out an original video with a fake one . It is also possible that an attacker can spread spam, fake and misleading information in this way. The Developers also demonstrated this flaw by setting up a fake CDN server and their T

10 Top Cybersecurity Tips For Staff Working Remotely

Because of COVID-19, lots of firms around the globe have started to roll out mandatory work from home (working remotely) policies. However, It can create additional cybersecurity threat because moving from a trusted office environment to working from home can create a security risk. Technology is growing so fast that it is very easy for people to do their work from home. However, while working remotely, there are some drawbacks too when we consider security. In today's digital era, there are high chances that remote workers can lose their privacy and also result in a breach of company security . Due to this, I am sharing 10 top useful cybersecurity tips for those who are working remotely. Online Threats To Remote Workers:- The remote workers must be aware of the following online threats : 1. Unsecured Wi-Fi Networks There are cases where remote workers use unsecured public Wi-Fi networks which are the main spots for attackers to spy on internet