Tag Archives Cyber Crime

Recently a Dark Web vendor Double Flag was reported selling more than 1 Billion accounts stolen from Chinese Internet companies. As per the reports, the data compromised belongs to companies such as NetEase Inc and its subsidiaries like 126.com and Yeah.net. In the last few months, DoubleFlag uploaded databases for sale which included Brazzers, Epic Games, ClixSense, uTorrent Forum, Mail.ru,…

Hacking, when done ethically is not a crime, just like some of the personalities mentioned here who have contributed significantly to cyber security around the globe. White hat hackers use their cyber security skills to break into protected systems and networks to assess and test the cyber security level and bring out the vulnerabilities before a malicious attacker, or black…

On the grounds of the latest findings by the cyber security firm FireEye claimed that South Korean entities had been compromised online. These entities, as the investigation suggests, have been targeted by a group of hackers backed by Chinese state. The events comes in the lights of the Chinese government constantly raising concerns against the deployment of the Terminal High-Altitude…

While almost every other Tech sector is driven by greater productivity and reducing inefficiencies, the cyber security sector is fueled by Cyber-crimes. In the 2017, the cyber security spending is expected to cross $90 billion mark. The dramatic rise in cyber-attacks, Ransomware epidemic, deployment of less protected IoT devices, malware scams on smart devices, and more sophisticated phishing makes the…

With about 74 percent of the world to be attacked each year and the economic losses by such cyber-attacks to reach $3 trillion by 2030, Microsoft has called on the governments around the globe to create a digital Geneva Convention just like the war weary nations in 1949 came together and drew up Geneva Conventions which now binds 196 countries.…

Ever since its inception in 2006 in Iceland, Wikileaks has released a number of significant documents that have been front-page news items across the globe. Recently this international Non for profit organization that specializes in exposing secrets has dumped thousands of confidential documents detailing the hacking tools and methodologies adopted by Central Investigation Agency of US. While the CIA has…

In today’s modern age of internet and the emergence of the Internet of things, the attempts at sneaking into vital data and financial resources are at an all-time high. Same has been the scenario with phishing emails which are delivering ransomware and other malicious files and executable to all kinds of masses. While the organizations have been backing up their…

Ever since CERN made the World Wide Web available to the public domain on a royalty-free basis in 1993, the internet has continued to drastically change the way we work, interact with one another and lead our daily lives. Touching almost every aspect of human life with cloud and mobile based computing widening the IT landscape along with the emerging…

Malicious Attackers usually rely on their Capabilities, intent and opportunity to be able to carry out an attack on their prey successfully. While the organisations can hardly do anything with the first two attributes, it’s the opportunities on offer that they can leverage their intelligence upon to apply intelligence-driven security across their infrastructure and operations. And with the increasing buzz…

Close