LinkedIn and the Dark Web Have a History to Share

117 Million LinkedIn Account Details from the 2012 Theft Go on Sale

The web seems to be getting darker by the day as we come across hackers and breached information being sold on the internet almost every day. LinkedIn recently suffered another setback when the company found out that the 2012 breach was far worse than they had figured. The same hacker who had taken responsibility for the disclosure of several passwords in 2012 claims to have the details of 117 ...

Continue Reading →
0

Hacker Craves Social Media Attention in Exchange for Hacked Data

Time to Change Your Password

Hacking has been one of the most interesting and damaging things on the internet. Some hacking attempts start out of curiosity and then we have those ingenious hackers who can cause a lot of damage to companies and individuals. Hold Security is a company which specializes in information security assessment, risk management as well as incident response. The company recently came across a Russian hacker who claims to have humongous amounts of data collected from different ...

Continue Reading →
0

How to Generate a Secure Password?

Passwords have always been important. For centuries now, password has been used in different forms to protect important documents and essential things from being accessed by unauthorized people. With the internet being introduced to the world, passwords gained a new meaning. They became the means of securing all online data. But on the flip side, it led to hackers who devised ways to get hold of data through various means.

While many users are careful with the passwords they create, there ...

Continue Reading →
0

U.S. Supreme Court Approves a Rule Change to Empower FBI to Hack Any Computer Anywhere

At a time when cyber-crime is on the rise, every internet user feels that they are at a risk of being victimized by hackers who may try to steal information or violate their privacy by resorting to devious means. And at a time like this, the FBI just got an approval by the U.S. Supreme Court to hack just about any computer in the world with a warrant.

A recent FBI escapade broke the previous Rule 41 of the ...

Continue Reading →
0

Over 100 Google Apps Affected By a Trojan

Android.Spy.277.origin is the name given to a Trojan that was recently added to the virus database of Russian Security firm Doctor Web. It is a Trojan that collects or put more aptly ‘steals’ information from users and delivers advertisements. The Trojan is being distributed through counterfeit versions of popular Android apps. The 104 apps that have the Trojan are available for download through the Google App Store.

These apps that contain the Trojan claim to offer services like photo-editing, wallpapers ...

Continue Reading →
0

Petya Ransomware Take Encryption to the Extreme Level by Encrypting Hard Drives

All this time we have been talking about the importance of encryption and how you can encrypt your files to keep them safe. We have a lot of apps that help us do this so that our banking details or personal communication is not being eavesdropped on by others. Quite inherent to their nature, all good tech inventions can be employed very quickly by the dark universe of internet where these inventions are twisted for the benefit of internet criminals. ...

Continue Reading →
0

5 Tips to Protect Yourself against Hackers

If it is a hardware or a software, it is hackable. This is the first thing that you must remember. A lot of them can be difficult to hack, but that does not mean that it cannot be hacked. A real hacker who really wants your information will get it. While some may not portray a lot of threat, there are nefarious hackers who could access your personal information and misuse a lot of your personal data.

While some hackers are ...

Continue Reading →
0

Hackers Behind the Ukrainian Blackout – Are Industrialized Nations Vulnerable to Such Cyberattacks?

It looks like hackers have been exploring new avenues. While we thought hacking was limited to devices like the computer, phones and tablets, hackers ingeniously attacked electrical substations killing electricity to almost 700,000 homes in Ukraine.

On December 23rd Ukraine’s Ivano-Frankivsk region saw the first blackout of its kind. The blackout was created by hackers who used malware to disconnect the substations leading to an outage. Researchers from the security firm iSIGHT Partners informed that they have obtained samples of ...

Continue Reading →
0

Top 5 Free Antivirus

The importance of an Anti-virus is known to everyone who uses a computer. Windows based devices are prone to viruses and malwares that can sneak into the system unknowingly. While Microsoft ensures that Windows Defender scans your computer for any threats in the absence of an anti-virus, it is not something you would want to rely on for PC protection. An Anti-virus that can handle all the threats without hampering your PC’s performance is a great choice. The fact is ...

Continue Reading →
0

Dell Security Systems Render Two Blatant Vulnerabilities

Dell is not quite done addressing its security problems. Just when one huge security issue was being covered, a new one has emerged and it seems to have an equally destructive effect on the company’s fame and the security of Dell users. Dell’s proactive acceptance of the security breach and the quick steps it took to fix it are highly commendable. It may be one of the reasons of satisfaction among Dell’s users.

The first big security issue in Dell ...

Continue Reading →
0
Page 1 of 2 12