Abstract The Huawei problem is simple to explain. The company is based in China and subject to the rules and dictates of the Chinese government. The government could require Huawei to install back doors into the 5G routers it sells… Read More ›
cyber attacks
Just One command & hacker stole 100 million users from the Capital One’s network
Abstract One command executed in the firewall hack allowed the intruder to gain credentials for an administrator account known as “*****WAF-Role.” This in turn enabled access to bank data stored under contract by a cloud computing company that went unnamed… Read More ›
CyberSecurity: Fake firms who say they recover data from ransomware but not really
As per ProPublica report, There are two firms identified in U.K. who market themselves as Data recovery firm. These firms provide solution to the their clients If any organization or individual are attacked by the ransomeware. But in reality, They… Read More ›
CyberSecurity: Triton is the world’s most murderous malware & It’s spreading.
Abstract The hackers had deployed malicious software, or malware, that let them take over the plant’s safety instrumented systems. These physical controllers and their associated software are the last line of defense against life-threatening disasters. They are supposed to kick… Read More ›
Steganography: A Safe Haven for Malware
Abstract Steganography, or the practice of concealing a file, message, image or video within another file, message, image or video, may be an older technique, but it continues to be an incredibly versatile and effective method for obscuring or hiding… Read More ›
CyberSecurity: How can a wireless phone/Printer used for DDOS Attack?
Imagine this: You have purchased a new wireless headphone. Now, You can’t wait until you get home to try them out so you unbox them in the car and grab your smartphone. Almost immediately, your phone picks up your wireless… Read More ›
CyberSecurity: It is time for you to think about cyber insurance.
It is the fact & everybody accepts that cyber breach is inevitable & sooner or later, Every business would face the heat. With the given situation in digital security problems, Businesses are starting looking into mitigating risk, recovery plan on… Read More ›