Tag Archives Articles on Latest Cyber Security Threats

Kickass Torrents (generally abbreviated as KAT) is a web service that provides a directory for torrent files and magnet links to enable peer-to-peer file sharing using the BitTorrent protocol. KAT was initially launched in November 2008 with the domain name kickasstorrents.com. However, its domain name kat.cr became more famous later. The web traffic ranking site Alexa ranked kat.cr at 72nd…

There is no doubt whatsoever where the new "Silicon Valley" for cyber security is located. It is in the center of the world in a tiny8 country called Israel that is besieged by war and terror. And the center of entrepreneurial action is in Tel Aviv. Also called the Startup Nation Israel has been churning out companies in the security realm…

Distributed denial-of-service (DDoS) have made a big dent in the financial and online online world in general in 2016. In late October one such DDoS attack on Domain Name System (DNS) service provider Dyn temporarily put the brakes on some of the most popular websites. With the coming year, the Top management and CEOs of major organizations will be bracing…

Just as we are entering a cash less economy, the next thing would be driver less transportation. This means to get from point A to Point B one will be increasingly dependent on automation. However, the darker side to autonomous vehicles and the artificial intelligence that powers them is causing concern among many people. Even modern cars that are driven…

Several W-Fi penetration testing tools in the market are employed by hackers. These tools can be effectively used to analyse and protect Wi-Fi networks from attacks and make them secure. Kismet: Kismet is an IEEE 802.11 (Wi-Fi) Layer 2 wireless network sniffing and intrusion detection tool which is typically utilised for Wi-Fi troubleshooting. This tool has client/server modular architecture and…

Distributed Denial-of-service (DDoS) attacks are going up in numbers and have evolved into complex and overwhelming security challenges for organizations, irrespective of the size - small, medium or large sized. Although these attacks are not a recent happening – they occurred in December 2014 and December 2015; the methods and resources available to carry out such strikes have dramatically transformed…

On 21st October, 2016 – Twitter, Spotify, Reddit, and several other websites came crashing down after a group of cyber-attackers launched a massive DDoS attack on the servers of Dyn, effectively leaving a massive chunk of the population without access to the Internet. What does it take to bring down Large Server Networks and Modern Firewalls you ask? Several gbps…

Hackers posted online on the dark web of having discovered vulnerabilities in the servers of Tesco Bank many months before the Bank was actually robbed of £2.5m by hackers. Cyberint the company that does cyber security research claims to have come across posting in dark web forums by hackers of claiming that the bank is a "cash milking cow" and "easy…

Security researchers at US Army Research Laboratory are working on cloaking data in a Fog network, conceptualizing a new form of data security that they describe as "cyberfog." This involves dissecting the data and spreading bits and pieces of the data across all kinds of devices including a device you may hold in the form of a Peer to Peer…

Digging The Dark Web and How it Works!

Googling for the Dark Web touches barely the surface of what it actually means. Popular folklore paints the Dark Web as an abode of hackers, drug peddlers, child porn, etc. However, it is much deeper and to learn more one has to dig further. The Dark Web is part of the Web or the Internet as we know it. Consider…

Close