In today’s modern age of internet and the emergence of the Internet of things, the attempts at sneaking into vital data and financial resources are at an all-time high. Same has been the scenario with phishing emails which are delivering ransomware and other malicious files and executable to all kinds of masses. While the organizations have been backing up their…

Ever since CERN made the World Wide Web available to the public domain on a royalty-free basis in 1993, the internet has continued to drastically change the way we work, interact with one another and lead our daily lives. Touching almost every aspect of human life with cloud and mobile based computing widening the IT landscape along with the emerging…

The Banks are investigating what is being considered as the largest system hack in the country’s history after malware was discovered on various workstations in the Polish banking industry. The malware infection ironically has resulted from the compromised servers at the Polish financial regulator, KNF itself. The KNF decided to take down its entire system after the discovery of suspicious…

Malicious Attackers usually rely on their Capabilities, intent and opportunity to be able to carry out an attack on their prey successfully. While the organisations can hardly do anything with the first two attributes, it’s the opportunities on offer that they can leverage their intelligence upon to apply intelligence-driven security across their infrastructure and operations. And with the increasing buzz…

A lot of businesses, owing to security vulnerabilities and other security issues feel the increasing need to hire a cyber-security specialist, who is capable and can help them solve major & minor issues with ease. The industry lacks skilled and knowledgeable people, which have left organizations vulnerable to attacks. The reason for the shortage can be attributed to the lack…

ESET had released a new campaign that was specifically directed towards MacOS, and the increase in Ransomware. The team wanted more Mac users to start using the ESET antivirus to protect their machines and information against virus and security vulnerabilities. It is apparently true that most hackers have a day when they can expose vulnerabilities within the software that aspire…

Anonymous, a group of hacktivists, is known for their social service along the cyber-crime world. They are known to take down the websites that carry out illegal activities and have special footprints in the dark web world. They are specifically against child pornography and have attacked websites that have gone against the principles of human rights or, have violated child…

A great number of people are going mobile with the Internet, and the way they use their devices. Growth in a number of WiFi enabled devices, and mobile WiFis has allowed people to access the Internetin public, and this excellent example of Internet of Things is seeing growth.Today, Internet of Things is conducting the way we connect to printers, coffee…

In a report published at the end of February, it was revealed that almost nine popular password managers confirmed security vulnerabilities. With this news comes the big question- will we be able to protect anything in 2017? Can we keep things safe from the hackers? The main purpose behind having password managers is to make sure all your passwords are…

Claiming that the Russian cyber-attacks and information warfare pose a threat to their democracies, the US and European intelligence heads are raising alarms about the anti-establishment politics being carried out across the West. The US intelligence has stated that as an order from Russian President Vladimir Putin, an influence campaign was conducted in 2016 which was aimed at US presidential…

Close