Daily Archives: March 27, 2019

Block Web Attacks On Your Phone Using The New Cloudbric Console App

Cloudbric Console App is now out and available for Android and iOS.

When we ask our users what they most like about Cloudbric’s services, our intuitive interface dashboard and functionality of our console are usually top picks.

We make it easy for users to simply login and view their security status without complications, as Cloudbric protection runs in the background.

Now, with the release of our first ever mobile application, it’s become even easier to access Cloudbric’s services and for users to monitor their websites via their smartphones.  

Cloudbric’s new service console app was developed with the goal of providing users greater control and visibility while on the go, allowing users to receive updates via push notifications anytime and anywhere.

With its simple user interface, users can access their information and site settings as well track their traffic usage and check on the progress of their site registration just as they would on their PCs.

Users can instantly get notifications of attacks to their sites and receive push alarms when their website or websites reach the 80% and 100% traffic limit, enabling quick response.

Typically, administrators, developers, or IT personnel can only monitor web attacks or resolve certain issues, such as blacklisting and whitelisting IPs, via their dashboard on the web. Now, the console app will allow IT personnel to resolve these issues and do everything administratively via the dashboard on mobile.

So whether you’re managing one site or twenty sites, the new console app will make viewing your security status easy.

But it doesn’t end there – Cloudbric’s development team is currently building a drop menu for integrating deep learning security (available in Q2).

A step further in bringing blockchain and security together, Cloudbric will also roll out a crypto wallet that will serve as an add-on for users who own CLB or any other crypto to safely store, transfer, and manage it.

Cloudbric’s console service app is now available for download on Google Play and the App Store.

Google Play and the Google Play logo are trademarks of Google LLC.

Apple, the Apple logo, iPhone, and iPad are trademarks of Apple Inc., registered in the U.S. and other countries and regions. App Store is a service mark of Apple Inc.

Make sure to follow us on our social media platforms (LinkedInTwitter, and Facebook) and our recently opened Telegram Announcement Channel for the latest updates!

The post Block Web Attacks On Your Phone Using The New Cloudbric Console App appeared first on Cloudbric.

iOS Users: Update Your Software to Avoid Security Vulnerabilities

On Monday, Apple made some bold announcements at their keynote event, including new subscription offerings for news, television, video games, and a credit card service. But while these exciting announcements were being made, the release of iOS 12.2 seemed to slip under the radar. This update contains 51 different security fixes and impacts devices ranging from the iPhone 5s and later, the iPad Air, and even products running tvOS. These software patches cover a variety of bugs that cybercriminals could use to obtain effects like denial-of-service, overwrite arbitrary files, or execute malicious code.

The iOS 12.2 update includes patches for vulnerabilities in core apps like Contacts, FaceTime, Mail, Messages, and more. According to security professional Alex Stamos, most of the vulnerabilities were found in Webkit, the browser engine Apple uses in many of its products including Safari, Mail, and App Store. Among these vulnerabilities were memory corruption bugs, which could lead to arbitrary code execution. This type of attack allows malicious actors to run any command on the target system, potentially taking over the victim’s files or allowing them to take over the victim’s system remotely. To prevent arbitrary code execution attacks, Apple improved device memory handling, state, and management. These processes control and coordinate device computer memory in order to optimize overall system performance. Another issue patched by this update is the ability for a cybercriminal to bypass sandbox restrictions, which protect a device’s critical infrastructure from suspicious code. To combat this, Apple issued an improvement to validation checks.

While it can be easy to click the “Remind Me Later” option when you receive a software update notification, the security updates included in iOS 12.2 should not be overlooked. To help keep your iOS devices protected and running smoothly, check out the following tips:

  • Update your software. To update your device to iOS 12.2, go to your Settings, then to General, and then click Software Update. From there, you will be able to download and install the update and patch over 50 security holes.
  • Turn on automatic updates. Turning on automatic updates helps shield you from exposure to threats brought on by software bugs and vulnerabilities. You can enable automatic updates in your Settings as well.
  • Use a security solution. To add an extra layer of protection to all your devices, install a security solution like McAfee Total Protection. This will allow you to have an extra security weapon and help defend your devices from cyberthreats.

And, as always, to stay on top of the latest consumer and mobile security threats, be sure to follow @McAfee_Home on Twitter, listen to our podcast Hackable? and ‘Like’ us on Facebook.

The post iOS Users: Update Your Software to Avoid Security Vulnerabilities appeared first on McAfee Blogs.

DMitry Deepmagic information Gathering Tool Kali Linux

DMitry Deepmagic information Gathering Tool Kali Linux   DMitry (Deepmagic Information Gathering Tool) is a open source Linux CLI tool developed by James Greig. Coded in C. DMitry is a powerful information gathering tool that aims to gather as much information about a host that is possible. Features include subdomains search, email addresses, uptime information, […]

The post DMitry Deepmagic information Gathering Tool Kali Linux appeared first on HackingVision.