Wednesday , August 22 2018

May, 2018

  • 26 May

    Networking: Finding Secret Information Like A Professional Spy

    Networking: Finding Secret Information Like A Professional Spy

    Secrets From A Professional Spy: Social media can be made safer if you take simple steps to strengthen your accounts. In fact, it has been found in many cases that with a little care and effort, you can lessen or avoid many common security issues and risks. You can reuse …

  • 25 May

    Criminals Using New Approach For Hacking WordPress Websites

    Criminals Using New Approach For Hacking WordPress Websites

    Hacking WordPress Websites: The hackers have come with a new method of installing the vulnerable backdoor plugins in websites which is powered by WordPress. This technique takes the advantage on the weaknesses of WordPress.com accounts and the JetPack Plugin. This technique is highly hard to compromise a website and the …

  • 25 May

    The Pirate Bay Will Be Blocked By Sweden ISP Telenor

    The Pirate Bay Will Be Blocked By Sweden ISP Telenor

    The Pirate Bay (TPB): The most popular file sharing torrent website which is going to be blocked in the Sweden by Sweden ISP Telenor which continually fought against the site blocking it from Sweden. Now finally, it is confirmed to block The Pirate Bay. Since very long the Telenor fought …

  • 25 May

    Social Networking To Gather Information?

    Social Networking To Gather Information?

    Social Networking to Gather Information: Over the last decade, some of the biggest security threats have come from the use of social networking. The rapid growth of these technologies lets millions of users each day post on Facebook, Twitter, and many other networks. What Type of Information Are They Posting? …

  • 24 May

    Cisco Half a Million Routers Have Been Hacked

    The Cisco Half of a Million Routers Have Been Hacked

    Cisco Over Half Million Routers Are Hacked: Cyber criminals have hacked and infected with virus at least 500,000 routers as well as the storage devices in what is believed to be a part of Russia attack to Ukraine. The U.S Department of Homeland Security has claimed that they are investigating …

  • 23 May

    Chinese Hackers Find Over a Dozen Vulnerabilities in BMW Cars

    Chinese Hackers Find Over a Dozen Vulnerabilities in BMW Cars

    Vulnerabilities in BMW Cars: Chinese Security Researchers have discovered dozens of vulnerabilities in the onboard computer units of BMW cars, and some of which can be used to exploit the vehicle remotely. The flaws were discovered during a year-long from security audit which is basically conducted y the researchers from …

  • 23 May

    Lawyers Exposing Client Data To Risk Of Cyber Attack

    Lawyers Exposing Client Data

    Lawyers Exposing Clients Data: A new research at Australia shows that the cyber security processes that lawyers use can put their client’s data at a huge risks. The Researchers from Edith Cowan University’s Security Research Institute performed a survey of 122 lawyers regarding the cyber security conduct. This survey has …

  • 23 May

    Social Engineering : Identity Theft

    Identity Theft

    Identity Theft: One of the most prominent and rapidly evolving threats is identity theft, which falls under the heading of social engineering. According to the Federal Trade Commission, in the United States, identity theft is one of the most rapidly growing crimes over the last few years; thus, the public …

  • 22 May

    Facebook Usage Has Increased Even After Cambridge Analytica Scandal

    Facebook Usage Has Increased Even After Cambridge Analytica Scandal

    Effect on Facebook Usage After Cambridge Analytica: Facebook has faced huge drop down in the users after the Cambridge Analytica Scandal but It has seen increased in numbers from the Goldman Sachs. The Deutsche Bank also found out the growth even after the company has removed around 583 million fake …

  • 22 May

    Mobile Device Security Models

    The Mobile Device Security Models Android & iOS

    Device Security Models: So how have designers built their systems with an eye toward addressing security problems? Several steps have been taken, but overall there has been an attempt to approach the problem of security through five key areas, each addressing a specific problem or need: Access control is used …