Category Archives Computer Security Issues Information

Some time back, the phishing attack that had the Gmail users bewildered was tried upon the Paypal users as well. Paypal, with its strong user base and growing popularity, makes it a perfect target for the cybercriminals. Before going ahead with the phishing attack on Paypal users, let’s understand what a phishing attack is. In a phishing attack, fake emails…

Ransomware, as the name suggests, is software that gives a free hand to the cyber criminals to extort money against the relevant data and documents stored in the computer. Here, the data and documents are held as hostages, and the malware authors can make you spend huge chunks of money to get the data back. This malicious software has found…

Security threats pertaining to loss of personal data such as account information, address, social security number, etc. being hacked is a constant in the cyber world. A lot of threats have indeed shaken the whole cyber world, and increased the instances of cyber crime. Recent amongst this, a cyber crime involving PlayStation and Xbox rose its ugly head. According to…

PoisonTap is a hacking tool developed by Samy Kamkar, an engineer behind a string of low-cost hacking tools. PoisonTap is a software that runs on a $5 Raspberry Pi Zero device. Upon plugging in the Raspberry Pi Zero device into a computer’s USB slot, PoisonTap hacks the lock screen password thereby allowing attackers to easily intercept all the unencrypted web…

A botnet is a group of interconnected devices infected with malware allowing attackers to acquire remote control and collectively manage the actions of all such devices. Botnets are used to launch Distributed Denial of Service (DDoS) attacks, which send data and web page requests to servers with such speed that the servers get inundated and consequently crash within no time.…

The importance of mobile cannot be overemphasized. But the soul of your handy gadget is none other than the data pack. Here are some tips to make the data go way longer. 1. Watch YouTube Videos on Low Resolution YouTube offers a plethora of fun videos to watch and enjoy but watching these on mobile is a guaranteed way to…

The news is going to come down like double jeopardy for the Indian public who are already coping with Demonetization. The ATMs currently in use are susceptible to data breach and hacking because they run on outdated Microsoft software. To understand the situation better, imagine the software as a sentinel. Without upgradation and continuous improvement, the ATMs running on outdated…

Several W-Fi penetration testing tools in the market are employed by hackers. These tools can be effectively used to analyse and protect Wi-Fi networks from attacks and make them secure. Kismet: Kismet is an IEEE 802.11 (Wi-Fi) Layer 2 wireless network sniffing and intrusion detection tool which is typically utilised for Wi-Fi troubleshooting. This tool has client/server modular architecture and…

Close