Blog
Tech Blog
ITAR
The International Traffic in Arms Regulations (ITAR) defined by the Code of Federal Regulations (CFR) - https://www.pmddtc.state.gov/ddtc_public?id=ddtc_kb_article_page&sys_id=24d528fddbfc930044f9ff621f961987 ITAR Part 120 - Purpose and Definitions -...
Microsoft Says Its Systems Were Also Breached in Massive SolarWinds Hack
The massive state-sponsored espionage campaign that compromised software maker SolarWinds also targeted Microsoft, as the unfolding investigation into the hacking spree reveals the incident may have been far more wider in scope, sophistication, and impact...
Google Chrome Update Gets Serious: Homeland Security (CISA) Confirms Attacks Underway
Homeland Security cybersecurity agency says update Google Chrome as attackers hone in on new security flaws. Department of Homeland Security urges users to update Google Chrome as attackers look to exploit ... [+] AFP VIA GETTY IMAGES Within the space of...
VMware addresses flaws exploited at recent Tianfu Cup
VMware has released patches for two serious ESXi vulnerabilities that were disclosed during the 2020 Tianfu Cup International PWN Contest. The Tianfu Cup is the most important hacking contest held in China, the total bonus of the contest this year was up to 1...
Google’s Latest Smartphone Feature: Listening to Every Sound in Your House
Tech giant Google has reportedly rolled out an update to its Android mobile platform that will enable devices to listen to every sound in users’ homes and alert them to certain household sounds. The Independent reports that Google has rolled out a new...
The Indian government is the latest to come out against ‘unsafe’ Zoom
Source: Zoom What you need to know The Indian government has issued an advisory to its employees, declaring the app 'unsafe.'Another government report also warned of significant weakness in the app that made it vulnerable to cyber-attacks.This follows similar moves by...