Tag Archives Cyber Security

Recently a Dark Web vendor Double Flag was reported selling more than 1 Billion accounts stolen from Chinese Internet companies. As per the reports, the data compromised belongs to companies such as NetEase Inc and its subsidiaries like 126.com and Yeah.net. In the last few months, DoubleFlag uploaded databases for sale which included Brazzers, Epic Games, ClixSense, uTorrent Forum, Mail.ru,…

Hacking, when done ethically is not a crime, just like some of the personalities mentioned here who have contributed significantly to cyber security around the globe. White hat hackers use their cyber security skills to break into protected systems and networks to assess and test the cyber security level and bring out the vulnerabilities before a malicious attacker, or black…

On the 28th of April, Wikileaks released details for Scribbles, also known as “Snowden Stopper”. It is alleged to be the whistleblower tracking tool that was devised by the CIA. It could embed the web beacon tags to the confidential documents, thus allowing the government agency to look into foreign spies as well as whistleblowers. What is a web beacon?…

While almost every other Tech sector is driven by greater productivity and reducing inefficiencies, the cyber security sector is fueled by Cyber-crimes. In the 2017, the cyber security spending is expected to cross $90 billion mark. The dramatic rise in cyber-attacks, Ransomware epidemic, deployment of less protected IoT devices, malware scams on smart devices, and more sophisticated phishing makes the…

With about 74 percent of the world to be attacked each year and the economic losses by such cyber-attacks to reach $3 trillion by 2030, Microsoft has called on the governments around the globe to create a digital Geneva Convention just like the war weary nations in 1949 came together and drew up Geneva Conventions which now binds 196 countries.…

Just in the span of four months, the Holland based analytics app ‘Twitter Counter’ has once again acted as a gateway for hackers to upload pro-turkey messages from some highly prominent twitter handles belonging to celebrities, Forbes, UNICEF, Nike Spain, Amnesty International and several numerous other individuals and organizations. All these events follow the recent incident where Dutch officials prohibited…

Ever since its inception in 2006 in Iceland, Wikileaks has released a number of significant documents that have been front-page news items across the globe. Recently this international Non for profit organization that specializes in exposing secrets has dumped thousands of confidential documents detailing the hacking tools and methodologies adopted by Central Investigation Agency of US. While the CIA has…

In today’s modern age of internet and the emergence of the Internet of things, the attempts at sneaking into vital data and financial resources are at an all-time high. Same has been the scenario with phishing emails which are delivering ransomware and other malicious files and executable to all kinds of masses. While the organizations have been backing up their…

Ever since CERN made the World Wide Web available to the public domain on a royalty-free basis in 1993, the internet has continued to drastically change the way we work, interact with one another and lead our daily lives. Touching almost every aspect of human life with cloud and mobile based computing widening the IT landscape along with the emerging…

Malicious Attackers usually rely on their Capabilities, intent and opportunity to be able to carry out an attack on their prey successfully. While the organisations can hardly do anything with the first two attributes, it’s the opportunities on offer that they can leverage their intelligence upon to apply intelligence-driven security across their infrastructure and operations. And with the increasing buzz…

Close