Tag Archives Data Encryption

There are a lot of public facing websites that the US air force owns, and it is time they check for the vulnerabilities within these websites to make them full proof. This way they can prevent it from being tampered, and can check for all the possible issues or bugs there are in these websites. For this purpose, the US…

The technology is continuously changing, and people are getting more and more used to it. Every now and then, something new is being developed, and new technologies are being launched almost every day. Behind all these things, there is a threat to our security that we people might be ignoring, and have to pay for that. Ransomware: What is this?…

Nowadays, Internet security is the most important issue in today’s world. Hacking is on the rise in this era. One such incident occurred in China; The Chinese video service giant Youku got hacked recently. Around 100 Million accounts got sold out on the website Dark web. The vendor has gone by the handle of CosmicDark is selling a database containing…

Ever since its inception in 2006 in Iceland, Wikileaks has released a number of significant documents that have been front-page news items across the globe. Recently this international Non for profit organization that specializes in exposing secrets has dumped thousands of confidential documents detailing the hacking tools and methodologies adopted by Central Investigation Agency of US. While the CIA has…

The Banks are investigating what is being considered as the largest system hack in the country’s history after malware was discovered on various workstations in the Polish banking industry. The malware infection ironically has resulted from the compromised servers at the Polish financial regulator, KNF itself. The KNF decided to take down its entire system after the discovery of suspicious…

In a report published at the end of February, it was revealed that almost nine popular password managers confirmed security vulnerabilities. With this news comes the big question- will we be able to protect anything in 2017? Can we keep things safe from the hackers? The main purpose behind having password managers is to make sure all your passwords are…

At the moment, everything the Pentagon has involves software. The exponential growth in data has led to increased opportunities for the Department of Defense but, it has also created a lot of challenges. One of the greatest challenges facing Pentagon is managing their systems in the era of cyber-crimes. The data is vulnerable, and the systems can be compromised in…

Many ATMs currently in India are susceptible to data breach and hacking because they run on outdated Microsoft software. There is a high probability that the ATM in your area is running on software, Microsoft stopped supporting and enhancing long back. Astonishingly about 70% ATMs in India run on Windows XP, for which Microsoft stopped offering security updates, patches and…

A cyber-attack last month, disabled thousands computers across several government ministries in Saudi Arabia. A rare cyber weapon was used to destroy and erase data. Malware used to violate the data of Saudi Arabian Oil Co in 2012 was employed again, this time rendering more than 35,000 computers worthless in a matter of minutes. As the abode of almost half…

12
Close