Best tips on staying safe from cyberstalking

cyberstalking_tips

Various advancements in technologies that help us to communicate better have opened up a lot of opportunities for people from all over the world.  Now, it is easier than ever for people to interact and do business with each other without having to leave their comfort place.  But these news avenues have also opened up …

Read moreBest tips on staying safe from cyberstalking

How do Lottery Scams work. Here is what you need to know.

lottery_scams

Scammers (along with some psychologists) completely understand the idea that some people do not have the ability to deny themselves an opportunity to make a ton of money in a short amount of time. And that is the primary reason why lottery scams are common as well as successful. Of course, the details of each …

Read moreHow do Lottery Scams work. Here is what you need to know.

Five most dangerous cyber threats of 2019

dangerous_cyberattacks

In short, the risks that have emerged in the last year or so include hackers exploiting blockchain-powered smart contracts along with deepfake videos that harness the power of AI. Some may find it a pessimistic view but 2018 was probably the year with the most number of huge cyber disasters. It was actually full of …

Read moreFive most dangerous cyber threats of 2019

Iranian hackers bypass Gmail and Yahoo Mail 2FA protections

hackers_from_iran

This past Thursday, researchers revealed that hackers had launched a massive phishing campaign. The campaign targeted journalists, activists and United States government officials. Hackers who launched the campaign made notable use of a technique which enabled them to bypass all the two-factor authentication protective features that services such as Yahoo Mail and Gmail offered to …

Read moreIranian hackers bypass Gmail and Yahoo Mail 2FA protections

What is social engineering?

social_engineering

Social engineering is nothing but a kind of attack (cyber) vector. This attack vector relies pretty heavily on user interaction. More often than not, this type of attack involves hackers manipulating users into breaking or violating normal security standard operating procedures. Hackers also try to get users to move away from best practices so that …

Read moreWhat is social engineering?

Quora.com hacked. Hackers steal 100 million users worth of data

quora_hacked

More specifically, password data. Along with that, hackers also managed to steal personal data belonging to users of the popular question answer site which included direct messages, email addresses, and names. It is safe to say that Quora users should probably brace themselves again for (you guessed it) another huge and devastating data breach. As …

Read moreQuora.com hacked. Hackers steal 100 million users worth of data

Internet Of Things: Innovation Must Slow Down For Device Safety

141011-Z-AW931-118

Bruce Schneier, a security expert, is of the view that in order to ensure the safety of the community, the innovation in IoT or Internet of Things had to be slowed down. Schneier fears that unless the government acted swiftly, a cyber disaster could affect many a life. The world is filling up with smart …

Read moreInternet Of Things: Innovation Must Slow Down For Device Safety

How Hackers Keep PCs Safe? They Work For Microsoft.

bill_gates_microsoft

Microsoft has an elite team of hackers who work hard to keep desktop computers running the Windows operating system safe. But who are these hackers? Where does Microsoft get them? Well, one of the members of the elite Microsoft jailbroke various versions of Nintendo handhelds in his former hacker life. There is another member of …

Read moreHow Hackers Keep PCs Safe? They Work For Microsoft.

US Midterm Elections: How Hackers Can Cause Mayhem

us midterm elections

Despite all the efforts in order to boost security, there is little doubt that cyber attacks can still hit vulnerable critical areas of the United States’ voting infrastructure. In about seven months time (on November 6 to be precise), the American people will make their way to the polls in an effort to take part …

Read moreUS Midterm Elections: How Hackers Can Cause Mayhem

Singapore Defense Ministry to Open Its System to Hackers for Improvement

Security expert touching HACKER onscreen

The Singapore Ministry of Defense has opened its online system to hackers who have been tasked with pointing out any weaknesses and loopholes that may appear, in order to strengthen the security features. The project is being conducted in a controlled environment in which white hat hackers will fix the loopholes to avoid any form …

Read moreSingapore Defense Ministry to Open Its System to Hackers for Improvement