The 25 Worst Passwords of 2015 |
Jan 26th, 2016
Password management company SplashData released its annual round-up of the worst passwords of 2015. The report is based on more than 2 million passwords that leaked online during the year. One trend the company found in 2015 is that while users are coming up with longer passwords, they are simple and not...
Programmer Site GitHub Says It’s Victim of Service-Denial Attack |
Mar 30th, 2015
(Bloomberg) — GitHub Inc., a U.S. website designed for computer programmers, has been under attack since Thursday in what may be an attempt by China to disrupt efforts to circumvent that country’s censorship policies. The San Francisco-based service, which helps programmers and tech companies share...
How to Secure Mobile Messaging App Features |
Mar 26th, 2015
When you send a text or MMS from your phone the normal way, you can’t control what happens to the information once it leaves your device. Wireless carriers are required to save messages for a certain length of time to assist authorities in criminal investigations. The recipient can save the message...
Advantage Dental of Redmond hacked; 151,000 patients affected |
Mar 18th, 2015
REDMOND — A company with more than 30 dental clinics serving low-income people in Oregon says it’s been hacked, and the intruders got Social Security numbers and other personal information, but not treatment or financial data. Redmond-based Advantage Dental is notifying patients and paying for...
How to Upgrade Kali Linux to Latest Version (1.1.*) |
Mar 16th, 2015
Hello there, in this post I am going to write the upgrade procedures for Kali Linux to the latest version as I did in my lab environment. I would like to inform you that these steps may change according to your environment. In my case, I upgraded from 1.0.7 x64 version to 1.1.0 x64. Let us start; Backup the...
Data Recovery: Best Practices |
Mar 12th, 2015
OVERVIEW Computer service centers encounter failed hard drives. Data recovery can be arevenue source, but it must be wisely and carefully done. Well-intentioned but ill-informed efforts and practices can reduce or even ruin the prospects for successful recovery, and they can even expose the provider to...
18,000 HMSA members’ information hacked |
Feb 26th, 2015
At least 18,000 Hawaii Medical Services Association members may have had their personal information accessed in a cyber attack on the Anthem Inc. A post on the HMSA website says users who received services from Anthem over the last 10 years could have had their information accessed. The number of affected...
BadUSB attack and the Industrial control systems |
Feb 23rd, 2015
Industrial control systems are in danger of being hacked by using a modified version of the BadUSB attack says Michael Toecker in his presentation at the Security Analyst Summit 2015 in Cancun. Not that long ago, BadUSB swept across the cybersecurity community as one of the hottest hacks of the year. BadUSB...
Shodan Founder finds 250,000 routers sharing same SSH keys |
Feb 23rd, 2015
The Founder of Shodan John Matherly was revamping the SSH banner when discovered a large number of devices that share same SSH keys. The Founder of Shodan, John Matherly, has conducted in December 2014 a personal research discovering that more than 250,000 routers used in Spain and deployed by Telefonica de...
Posted on Mar 9th, 2015 |
0 comments
There have been lots of custom ROMs for the Samsung Galaxy S3 based on Google’s latest version of Android, 5.0 Lollipop. A majority devices like the S3, Xperia and Nexus have received 5.0 Lollipop builds....
Posted on Feb 23rd, 2015 |
0 comments
Bio hacking – technology and humans have never been so close, they complement each other. But what are the security and privacy risks? IS BIOHACKING A SECURITY RISK? Imagine a world where our day to day...
Posted on Feb 23rd, 2015 |
0 comments
SplashData has published its annual report on the used of passwords that includes the list of the Worst passwords of 2014. Here we are to analyze the annual study published by SplashData, titled “123456”...
Posted on Feb 23rd, 2015 |
0 comments
The National Institute of Information and Communications Technology revealed that more than 25 billion cyber attacks hit systems in Japan during 2014. I decided to write this post to highlight the importance...
Posted on Feb 23rd, 2015 |
0 comments
DNA Cryptography can be defined as a hiding data in terms of DNA Sequence. Why DNA Cryptography and which are the principal benefits for its adoption? DNA Computing Information Security is very vital in...
Posted on Dec 21st, 2014 |
0 comments
Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention systems), and Honeypots are modifying the way people think about security....
popular articles
random articles