Category Archives IOT

Recently a Dark Web vendor Double Flag was reported selling more than 1 Billion accounts stolen from Chinese Internet companies. As per the reports, the data compromised belongs to companies such as NetEase Inc and its subsidiaries like 126.com and Yeah.net. In the last few months, DoubleFlag uploaded databases for sale which included Brazzers, Epic Games, ClixSense, uTorrent Forum, Mail.ru,…

On the grounds of the latest findings by the cyber security firm FireEye claimed that South Korean entities had been compromised online. These entities, as the investigation suggests, have been targeted by a group of hackers backed by Chinese state. The events comes in the lights of the Chinese government constantly raising concerns against the deployment of the Terminal High-Altitude…

Nowadays, Internet security is the most important issue in today’s world. Hacking is on the rise in this era. One such incident occurred in China; The Chinese video service giant Youku got hacked recently. Around 100 Million accounts got sold out on the website Dark web. The vendor has gone by the handle of CosmicDark is selling a database containing…

With about 74 percent of the world to be attacked each year and the economic losses by such cyber-attacks to reach $3 trillion by 2030, Microsoft has called on the governments around the globe to create a digital Geneva Convention just like the war weary nations in 1949 came together and drew up Geneva Conventions which now binds 196 countries.…

In today’s modern age of internet and the emergence of the Internet of things, the attempts at sneaking into vital data and financial resources are at an all-time high. Same has been the scenario with phishing emails which are delivering ransomware and other malicious files and executable to all kinds of masses. While the organizations have been backing up their…

Ever since CERN made the World Wide Web available to the public domain on a royalty-free basis in 1993, the internet has continued to drastically change the way we work, interact with one another and lead our daily lives. Touching almost every aspect of human life with cloud and mobile based computing widening the IT landscape along with the emerging…

A great number of people are going mobile with the Internet, and the way they use their devices. Growth in a number of WiFi enabled devices, and mobile WiFis has allowed people to access the Internetin public, and this excellent example of Internet of Things is seeing growth.Today, Internet of Things is conducting the way we connect to printers, coffee…

A botnet is a group of interconnected devices infected with malware allowing attackers to acquire remote control and collectively manage the actions of all such devices. Botnets are used to launch Distributed Denial of Service (DDoS) attacks, which send data and web page requests to servers with such speed that the servers get inundated and consequently crash within no time.…

If you have watched the hit sci-fi television series, Mr. Robot what you are to learn may seem like a scene taken from the series. A sweeping cyber attack took down almost a million homes offline, disconnecting Internet access, television and phones. Though it is not clear who or why someone would do this, the fact that such a thing…

12
Close