Tag Archives Threats and Vulnerabilities

Hacking, when done ethically is not a crime, just like some of the personalities mentioned here who have contributed significantly to cyber security around the globe. White hat hackers use their cyber security skills to break into protected systems and networks to assess and test the cyber security level and bring out the vulnerabilities before a malicious attacker, or black…

There are a lot of public facing websites that the US air force owns, and it is time they check for the vulnerabilities within these websites to make them full proof. This way they can prevent it from being tampered, and can check for all the possible issues or bugs there are in these websites. For this purpose, the US…

The technology is continuously changing, and people are getting more and more used to it. Every now and then, something new is being developed, and new technologies are being launched almost every day. Behind all these things, there is a threat to our security that we people might be ignoring, and have to pay for that. Ransomware: What is this?…

ESET had released a new campaign that was specifically directed towards MacOS, and the increase in Ransomware. The team wanted more Mac users to start using the ESET antivirus to protect their machines and information against virus and security vulnerabilities. It is apparently true that most hackers have a day when they can expose vulnerabilities within the software that aspire…

A great number of people are going mobile with the Internet, and the way they use their devices. Growth in a number of WiFi enabled devices, and mobile WiFis has allowed people to access the Internetin public, and this excellent example of Internet of Things is seeing growth.Today, Internet of Things is conducting the way we connect to printers, coffee…

In a report published at the end of February, it was revealed that almost nine popular password managers confirmed security vulnerabilities. With this news comes the big question- will we be able to protect anything in 2017? Can we keep things safe from the hackers? The main purpose behind having password managers is to make sure all your passwords are…

At the moment, everything the Pentagon has involves software. The exponential growth in data has led to increased opportunities for the Department of Defense but, it has also created a lot of challenges. One of the greatest challenges facing Pentagon is managing their systems in the era of cyber-crimes. The data is vulnerable, and the systems can be compromised in…

Ransomware, as the name suggests, is software that gives a free hand to the cyber criminals to extort money against the relevant data and documents stored in the computer. Here, the data and documents are held as hostages, and the malware authors can make you spend huge chunks of money to get the data back. This malicious software has found…

Many ATMs currently in India are susceptible to data breach and hacking because they run on outdated Microsoft software. There is a high probability that the ATM in your area is running on software, Microsoft stopped supporting and enhancing long back. Astonishingly about 70% ATMs in India run on Windows XP, for which Microsoft stopped offering security updates, patches and…

The importance of mobile cannot be overemphasized. But the soul of your handy gadget is none other than the data pack. Here are some tips to make the data go way longer. 1. Watch YouTube Videos on Low Resolution YouTube offers a plethora of fun videos to watch and enjoy but watching these on mobile is a guaranteed way to…

12
Close