Category Archives What is Cyber Security Strategy

A cyber-attack last month, disabled thousands computers across several government ministries in Saudi Arabia. A rare cyber weapon was used to destroy and erase data. Malware used to violate the data of Saudi Arabian Oil Co in 2012 was employed again, this time rendering more than 35,000 computers worthless in a matter of minutes. As the abode of almost half…

When most 22 year olds are partying and picking up less lethal challenges. Javed Khatri decides to storm up things a bit. In a streak of positive patriotism, the young App developer from Mumbai hacked into the PM’s app. He claims that his intent was not malicious. It was a constructive effort to point out the loopholes in the current…

Several W-Fi penetration testing tools in the market are employed by hackers. These tools can be effectively used to analyse and protect Wi-Fi networks from attacks and make them secure. Kismet: Kismet is an IEEE 802.11 (Wi-Fi) Layer 2 wireless network sniffing and intrusion detection tool which is typically utilised for Wi-Fi troubleshooting. This tool has client/server modular architecture and…

Distributed Denial-of-service (DDoS) attacks are going up in numbers and have evolved into complex and overwhelming security challenges for organizations, irrespective of the size - small, medium or large sized. Although these attacks are not a recent happening – they occurred in December 2014 and December 2015; the methods and resources available to carry out such strikes have dramatically transformed…

More than one million accounts hacked, with the number increasing by 13,000 every single day. These are the figures associated with the latest large scale malware attack, known as the Gooligan attack. The Malware, after infecting your mobile phone, roots it, steals authentication data and hacks into your Gmail accounts, including the Play Store. It then starts downloading malicious apps.…

On 21st October, 2016 – Twitter, Spotify, Reddit, and several other websites came crashing down after a group of cyber-attackers launched a massive DDoS attack on the servers of Dyn, effectively leaving a massive chunk of the population without access to the Internet. What does it take to bring down Large Server Networks and Modern Firewalls you ask? Several gbps…

Hackers posted online on the dark web of having discovered vulnerabilities in the servers of Tesco Bank many months before the Bank was actually robbed of £2.5m by hackers. Cyberint the company that does cyber security research claims to have come across posting in dark web forums by hackers of claiming that the bank is a "cash milking cow" and "easy…

Security researchers at US Army Research Laboratory are working on cloaking data in a Fog network, conceptualizing a new form of data security that they describe as "cyberfog." This involves dissecting the data and spreading bits and pieces of the data across all kinds of devices including a device you may hold in the form of a Peer to Peer…

When Hacker's attacked the French TV station, TV Monde in April 2015, little they realize the cost of it all. A total of $9 million. But more than the  money, the organization had to change the way it functions. Those who work in the media industry are not adaptable to strictures and most of them do not like to work…

Launching a DDoS is Piece of Cake

If it was believed that only professional hackers can launch a Distributed Denial of Service (DDoS) Attack, think twice! Hackers have recently released the source code of the malware that enabled them to create a massive network of botnets and launch the crippling DDoS attack on cyber security analyst, Brian Krebs's website. The malware named "Mirai" and posted on HackForum…

Close