Author Archives: Buja Atdhe
A hacker Thursday afternoon published what he says is the decryption key for Apple iOS’ Secure Enclave Processor (SEP) firmware. The hacker, identified only as xerub, told Threatpost that the key unlocks only the SEP firmware, and that this would … Continue reading
The 8th Annual Billington CyberSecurity Summit on September 13 will attract over 1000 attendees at the Leading Fall Forum on Cybersecurity in the nation’s capital. The Summit will bring together world-class cybersecurity thought leaders to engage in high-level information sharing, unparalleled … Continue reading
FireEye has released a report which discusses the tools-of-the-trade used by what it names APT28, the group of Russian state-sponsored hackers who are carrying out hacks to further promote the Russian political agenda.
Hacker group APT28 is using the EternalBlue hacking tool to spread throughout hotel networks and collect guests’ information. If you’re not yet skeptical of hotel wifi networks, APT28 is giving you a good reason to think twice before logging on. … Continue reading
Published on PCWorld.al The purpose of this article is to provide a clear overview of the project planning and management processes and to see enough the importance of applying guidelines and standards for successful project management. Here is also used some … Continue reading
Published on PCWorld.al In this analysis and special study for PCWorld and CiO Albanian are presented the solutions in providing the appropriate and efficient services at the right time for the citizens / businesses that need it, at the same … Continue reading
Published on PCWorld.al Control the flow of information All events occurring in the security field i.e. vulnerabilities, compromises, crashes, different attacks, or cause-of-action takes the basis and the starting point for the information flow. A process or cycle that defines … Continue reading