Tag Archives Network Security

“Orange is the new black” is definitely a raging series, and people look forward to the new episodes. While people were waiting for the latest episode of the series to go live, a hacker who goes by the name The DarkOverLord released the upcoming series on the different file sharing networks, even before it went live on Netflix. This is…

On the 28th of April, Wikileaks released details for Scribbles, also known as “Snowden Stopper”. It is alleged to be the whistleblower tracking tool that was devised by the CIA. It could embed the web beacon tags to the confidential documents, thus allowing the government agency to look into foreign spies as well as whistleblowers. What is a web beacon?…

While almost every other Tech sector is driven by greater productivity and reducing inefficiencies, the cyber security sector is fueled by Cyber-crimes. In the 2017, the cyber security spending is expected to cross $90 billion mark. The dramatic rise in cyber-attacks, Ransomware epidemic, deployment of less protected IoT devices, malware scams on smart devices, and more sophisticated phishing makes the…

Just in the span of four months, the Holland based analytics app ‘Twitter Counter’ has once again acted as a gateway for hackers to upload pro-turkey messages from some highly prominent twitter handles belonging to celebrities, Forbes, UNICEF, Nike Spain, Amnesty International and several numerous other individuals and organizations. All these events follow the recent incident where Dutch officials prohibited…

PoisonTap is a hacking tool developed by Samy Kamkar, an engineer behind a string of low-cost hacking tools. PoisonTap is a software that runs on a $5 Raspberry Pi Zero device. Upon plugging in the Raspberry Pi Zero device into a computer’s USB slot, PoisonTap hacks the lock screen password thereby allowing attackers to easily intercept all the unencrypted web…

A botnet is a group of interconnected devices infected with malware allowing attackers to acquire remote control and collectively manage the actions of all such devices. Botnets are used to launch Distributed Denial of Service (DDoS) attacks, which send data and web page requests to servers with such speed that the servers get inundated and consequently crash within no time.…

Linux is an open source operating system which has evolved from its previous version Unix. Though other operating systems offer more user friendliness, Linux has some amazing features that make it a more preferred choice for use by hackers. A few of such features are described below: Strong Access and Control: Linux offers strong access and control to its users.…

A cyber-attack last month, disabled thousands computers across several government ministries in Saudi Arabia. A rare cyber weapon was used to destroy and erase data. Malware used to violate the data of Saudi Arabian Oil Co in 2012 was employed again, this time rendering more than 35,000 computers worthless in a matter of minutes. As the abode of almost half…

The news is going to come down like double jeopardy for the Indian public who are already coping with Demonetization. The ATMs currently in use are susceptible to data breach and hacking because they run on outdated Microsoft software. To understand the situation better, imagine the software as a sentinel. Without upgradation and continuous improvement, the ATMs running on outdated…

12
Close