Category Archives Cyber Security Articles 2015 – 2016

Recently a Dark Web vendor Double Flag was reported selling more than 1 Billion accounts stolen from Chinese Internet companies. As per the reports, the data compromised belongs to companies such as NetEase Inc and its subsidiaries like 126.com and Yeah.net. In the last few months, DoubleFlag uploaded databases for sale which included Brazzers, Epic Games, ClixSense, uTorrent Forum, Mail.ru,…

Phishing is a form of cyber-attack in which an individual receives an email which appears to be from a trusted source. This deceptive mail can be dangerous in multiple ways as they can ask for money or take the individual to an equal deceptive website that can cause him to install malware onto his computer or fill in sensitive information.…

Just in the span of four months, the Holland based analytics app ‘Twitter Counter’ has once again acted as a gateway for hackers to upload pro-turkey messages from some highly prominent twitter handles belonging to celebrities, Forbes, UNICEF, Nike Spain, Amnesty International and several numerous other individuals and organizations. All these events follow the recent incident where Dutch officials prohibited…

Ever since its inception in 2006 in Iceland, Wikileaks has released a number of significant documents that have been front-page news items across the globe. Recently this international Non for profit organization that specializes in exposing secrets has dumped thousands of confidential documents detailing the hacking tools and methodologies adopted by Central Investigation Agency of US. While the CIA has…

In today’s modern age of internet and the emergence of the Internet of things, the attempts at sneaking into vital data and financial resources are at an all-time high. Same has been the scenario with phishing emails which are delivering ransomware and other malicious files and executable to all kinds of masses. While the organizations have been backing up their…

Ever since CERN made the World Wide Web available to the public domain on a royalty-free basis in 1993, the internet has continued to drastically change the way we work, interact with one another and lead our daily lives. Touching almost every aspect of human life with cloud and mobile based computing widening the IT landscape along with the emerging…

Malicious Attackers usually rely on their Capabilities, intent and opportunity to be able to carry out an attack on their prey successfully. While the organisations can hardly do anything with the first two attributes, it’s the opportunities on offer that they can leverage their intelligence upon to apply intelligence-driven security across their infrastructure and operations. And with the increasing buzz…

A lot of businesses, owing to security vulnerabilities and other security issues feel the increasing need to hire a cyber-security specialist, who is capable and can help them solve major & minor issues with ease. The industry lacks skilled and knowledgeable people, which have left organizations vulnerable to attacks. The reason for the shortage can be attributed to the lack…

A cyber-attack last month, disabled thousands computers across several government ministries in Saudi Arabia. A rare cyber weapon was used to destroy and erase data. Malware used to violate the data of Saudi Arabian Oil Co in 2012 was employed again, this time rendering more than 35,000 computers worthless in a matter of minutes. As the abode of almost half…

The importance of mobile cannot be overemphasized. But the soul of your handy gadget is none other than the data pack. Here are some tips to make the data go way longer. 1. Watch YouTube Videos on Low Resolution YouTube offers a plethora of fun videos to watch and enjoy but watching these on mobile is a guaranteed way to…

Close