Category Archives Articles on Latest Cyber Security Threats

A step in the right direction: Defense to invest and expand it Deep Web Search Engine Let’s first understand Deep Web. Search engines like Google and Yahoo usually show the most popular pages. But, Deep Web is the data which is not fished by usual search engines. This dangerous anonymity can be very perilous in terms of safety and security.…

Kickass Torrents (generally abbreviated as KAT) is a web service that provides a directory for torrent files and magnet links to enable peer-to-peer file sharing using the BitTorrent protocol. KAT was initially launched in November 2008 with the domain name kickasstorrents.com. However, its domain name kat.cr became more famous later. The web traffic ranking site Alexa ranked kat.cr at 72nd…

There is no doubt whatsoever where the new "Silicon Valley" for cyber security is located. It is in the center of the world in a tiny8 country called Israel that is besieged by war and terror. And the center of entrepreneurial action is in Tel Aviv. Also called the Startup Nation Israel has been churning out companies in the security realm…

Linux is an open source operating system which has evolved from its previous version Unix. Though other operating systems offer more user friendliness, Linux has some amazing features that make it a more preferred choice for use by hackers. A few of such features are described below: Strong Access and Control: Linux offers strong access and control to its users.…

Just as we are entering a cash less economy, the next thing would be driver less transportation. This means to get from point A to Point B one will be increasingly dependent on automation. However, the darker side to autonomous vehicles and the artificial intelligence that powers them is causing concern among many people. Even modern cars that are driven…

A cyber-attack last month, disabled thousands computers across several government ministries in Saudi Arabia. A rare cyber weapon was used to destroy and erase data. Malware used to violate the data of Saudi Arabian Oil Co in 2012 was employed again, this time rendering more than 35,000 computers worthless in a matter of minutes. As the abode of almost half…

The importance of mobile cannot be overemphasized. But the soul of your handy gadget is none other than the data pack. Here are some tips to make the data go way longer. 1. Watch YouTube Videos on Low Resolution YouTube offers a plethora of fun videos to watch and enjoy but watching these on mobile is a guaranteed way to…

When most 22 year olds are partying and picking up less lethal challenges. Javed Khatri decides to storm up things a bit. In a streak of positive patriotism, the young App developer from Mumbai hacked into the PM’s app. He claims that his intent was not malicious. It was a constructive effort to point out the loopholes in the current…

Several W-Fi penetration testing tools in the market are employed by hackers. These tools can be effectively used to analyse and protect Wi-Fi networks from attacks and make them secure. Kismet: Kismet is an IEEE 802.11 (Wi-Fi) Layer 2 wireless network sniffing and intrusion detection tool which is typically utilised for Wi-Fi troubleshooting. This tool has client/server modular architecture and…

Close