Category Archives Password Vulnerability

There are a lot of public facing websites that the US air force owns, and it is time they check for the vulnerabilities within these websites to make them full proof. This way they can prevent it from being tampered, and can check for all the possible issues or bugs there are in these websites. For this purpose, the US…

“Orange is the new black” is definitely a raging series, and people look forward to the new episodes. While people were waiting for the latest episode of the series to go live, a hacker who goes by the name The DarkOverLord released the upcoming series on the different file sharing networks, even before it went live on Netflix. This is…

With about 74 percent of the world to be attacked each year and the economic losses by such cyber-attacks to reach $3 trillion by 2030, Microsoft has called on the governments around the globe to create a digital Geneva Convention just like the war weary nations in 1949 came together and drew up Geneva Conventions which now binds 196 countries.…

Just in the span of four months, the Holland based analytics app ‘Twitter Counter’ has once again acted as a gateway for hackers to upload pro-turkey messages from some highly prominent twitter handles belonging to celebrities, Forbes, UNICEF, Nike Spain, Amnesty International and several numerous other individuals and organizations. All these events follow the recent incident where Dutch officials prohibited…

A lot of businesses, owing to security vulnerabilities and other security issues feel the increasing need to hire a cyber-security specialist, who is capable and can help them solve major & minor issues with ease. The industry lacks skilled and knowledgeable people, which have left organizations vulnerable to attacks. The reason for the shortage can be attributed to the lack…

A great number of people are going mobile with the Internet, and the way they use their devices. Growth in a number of WiFi enabled devices, and mobile WiFis has allowed people to access the Internetin public, and this excellent example of Internet of Things is seeing growth.Today, Internet of Things is conducting the way we connect to printers, coffee…

In a report published at the end of February, it was revealed that almost nine popular password managers confirmed security vulnerabilities. With this news comes the big question- will we be able to protect anything in 2017? Can we keep things safe from the hackers? The main purpose behind having password managers is to make sure all your passwords are…

Claiming that the Russian cyber-attacks and information warfare pose a threat to their democracies, the US and European intelligence heads are raising alarms about the anti-establishment politics being carried out across the West. The US intelligence has stated that as an order from Russian President Vladimir Putin, an influence campaign was conducted in 2016 which was aimed at US presidential…

With every gap pronounced, Whatsapp is releasing updates to close them and ensure a seamless user experience. Currently, WhatsApp is all set to introduce a new feature which will allow you to recall messages that were sent by mistake. As part of this update, Whatsapp will also allow live location tracking to know your contacts’ whereabouts in real-time. Interesting, isn’t…

Close