Category Archives Identity Theft Protection

With about 74 percent of the world to be attacked each year and the economic losses by such cyber-attacks to reach $3 trillion by 2030, Microsoft has called on the governments around the globe to create a digital Geneva Convention just like the war weary nations in 1949 came together and drew up Geneva Conventions which now binds 196 countries.…

Ever since CERN made the World Wide Web available to the public domain on a royalty-free basis in 1993, the internet has continued to drastically change the way we work, interact with one another and lead our daily lives. Touching almost every aspect of human life with cloud and mobile based computing widening the IT landscape along with the emerging…

Anonymous, a group of hacktivists, is known for their social service along the cyber-crime world. They are known to take down the websites that carry out illegal activities and have special footprints in the dark web world. They are specifically against child pornography and have attacked websites that have gone against the principles of human rights or, have violated child…

In a report published at the end of February, it was revealed that almost nine popular password managers confirmed security vulnerabilities. With this news comes the big question- will we be able to protect anything in 2017? Can we keep things safe from the hackers? The main purpose behind having password managers is to make sure all your passwords are…

At the moment, everything the Pentagon has involves software. The exponential growth in data has led to increased opportunities for the Department of Defense but, it has also created a lot of challenges. One of the greatest challenges facing Pentagon is managing their systems in the era of cyber-crimes. The data is vulnerable, and the systems can be compromised in…

With every gap pronounced, Whatsapp is releasing updates to close them and ensure a seamless user experience. Currently, WhatsApp is all set to introduce a new feature which will allow you to recall messages that were sent by mistake. As part of this update, Whatsapp will also allow live location tracking to know your contacts’ whereabouts in real-time. Interesting, isn’t…

Some time back, the phishing attack that had the Gmail users bewildered was tried upon the Paypal users as well. Paypal, with its strong user base and growing popularity, makes it a perfect target for the cybercriminals. Before going ahead with the phishing attack on Paypal users, let’s understand what a phishing attack is. In a phishing attack, fake emails…

PoisonTap is a hacking tool developed by Samy Kamkar, an engineer behind a string of low-cost hacking tools. PoisonTap is a software that runs on a $5 Raspberry Pi Zero device. Upon plugging in the Raspberry Pi Zero device into a computer’s USB slot, PoisonTap hacks the lock screen password thereby allowing attackers to easily intercept all the unencrypted web…

According to the academic journal IEEE Security & Privacy, it takes less than six second to crack  the card number, expiry date and security code of any Visa credit or debit card just by guessing. A research paper highlighting what is termed as "Distributed Guessing Attack" explains how  one can get around even the most intricate checks and balances to…

Close