Author Archives
-
CyberSecurity: DNS Spoofing attack. Google DNS-over-TLS security solution.
Let’s take a quick glance at how client & server communication starts. When you browse any websites & you type a human-readable domain name (i.e followcybersecurity.com) but behind the scene, Two computers (i.e client & server) do not understand the… Read More ›
-
CyberSecurity: The Rest of the Week’s News (Jan 7, 2019)
Attack Doubles Up on Malware (January 7, 2019) An attack that combines two known pieces of malware has been detected in the wild. The attack uses the Vidar data harvesting malware followed by GandCrab ransomware. Vidar has the ability to… Read More ›
-
CyberSecurity: There are no free apps.
In our phone, You will have many types of applications. Many useful Applications may not pre-installed in the phone by default. So you download apps like document scanner, themes, daily useful apps like flashlight etc. It is pretty common nowadays…. Read More ›
-
CyberSecurity: It is time for you to think about cyber insurance.
It is the fact & everybody accepts that cyber breach is inevitable & sooner or later, Every business would face the heat. With the given situation in digital security problems, Businesses are starting looking into mitigating risk, recovery plan on… Read More ›
-
CyberSecurity: Hacked Pakistani bank cards for sale on the dark web again
Abstract Hackers put the purloined details from 177,878 cards for sale on the dark web market Joker’s Stash around Nov. 13, according to Moscow-based cybersecurity company Group-IB, with 150,632 of those records appearing to come from Pakistani banks. An Oct. 27 breach led at least one… Read More ›
-
CyberSecurity: The Rest of the Week’s Cyber News
Bitcoin Stolen From Electrum Wallets (December 27, 2018) More than 200 bitcoin has been stolen from Electrum wallets since December 21. The attacker or attackers exploited a vulnerability in the Electrum architecture that allows Electrum servers to trigger custom… Read More ›