Tag Archives Computer Security Issues Information

Digging The Dark Web and How it Works!

Googling for the Dark Web touches barely the surface of what it actually means. Popular folklore paints the Dark Web as an abode of hackers, drug peddlers, child porn, etc. However, it is much deeper and to learn more one has to dig further. The Dark Web is part of the Web or the Internet as we know it. Consider…

While most laptop users would not bother about such things as people spying on them, since Facebook's CEO Mark Zuckerberg shared the tit bit about plastering his own laptop's webcam with a tape, people are now more cautious. This has spawned an enterprising industry of designer Webcam tapes and plugins specially geared to the high profile laptop user going from…

Yes that is all it takes a $100 bill to purchase electronic gadgets that can unlock iPhone passcodes. Recently,  a computer scientist from Cambridge was able to clone the iPhone's memory chips and thus be able to bypass the limitation on attempts to guess the passcode. And this comes after the so called attempts by FBI to not being able…

Unlocking your computer if you forget your credentials may not be that difficult from now on. If you knew how to spoof your Ethernet adaptor card. Security researcher Rob Fuller has  detailed in a blog post how, it is possible to trick a computer into passing on login credentials by spoofing it into installing an Ethernet adaptor. When plugged in…

It is not laughing matter for military planners on the news that in another 4 years there would be millions of Internet of Thing (IoT) of devices. One in five cars would have an internet connected device. Military cyber defense analysts are reviewing what this means for national security. The recent terror attack in Nice where a terrorists mowed down…

When one was hoping there is some sense of security in the cloud, here comes the Rowhammer exploit. Once successful, the Rowhammer attacks virtual machines and takes over complete control with existing encryption solutions unable to stop it. Rowhammer is a highly sophisticated exploit were one virtual machine on the cloud is able to steal the encryption key of another…

The convenience of using a wireless keyboard are awesome. Specially if one is not so comfortable using the Swipe keys on your Tablet or the cramped keys of your 11" Laptop computer. However, many of these wireless keyboards have now found to be vulnerable to "Keysniffer" attack. Using this attack, a hacker can find out every key you press on…

This may really be a shocking news specially considering the recent spate of air crashes involving both technical and terrorist attacks. It is already a fact that most modern airlines have a built in remote control system that can take over the controls of the plane in case of an emergency. Ofcourse, this depends on certain instruments functioning. According to…

12
Close