Archive for 2016
Stratgies to Stay Safe from Cyber Attacks

Cyber security is vital for businesses, especially small and medium sized ones. Why? Because they often don’t have the cyber security infrastructure or staff that large companies have to ensure that files and bank accounts aren’t.
Thursday, September 15, 2016
Posted by Sivapriya
New Malware Allows Full Access to Mac Systems

Recently the internet security software company Bitdefender found that Apple computer systems, Mac OS X, faces a new threat that allows attackers to take full control of the system imperceptibly and collect all the sensitive information from the infected.
Hackers Show How To Hack Anyone’s Facebook Account Just By Knowing Phone Number

By exploiting the SS7 flaw, a hacker can hack someone’s Facebook account just by knowing the associated phone number. This flaw allows a hacker to divert the OTP code to his/her own phone and use it to access the victim’s Facebook account. The security.
Thursday, June 16, 2016
Posted by Sivapriya
Ethical Hacking Course in Vellore
Ethical Hacking Course in Vellore | Kanchipuram | Gudiyatham
Ethical Hacking! An action performed by a hacker to malfunction a system or an entire network with an intention to interrupt or crash the framework bypassing all the security issues such.
IRCTC website hacked, information of lakhs feared stolen.

The website of the Indian Railways Catering and Tourism Corporation (IRCTC) was hacked and the personal information of around 1 crore users is feared to be leaked, said reports on Thursday. The official website of the Indian Railways, IRCTC is the.
Thursday, May 5, 2016
Posted by Sivapriya
How to Become an Ethical Hacker

Cyber-security is
one of the major concerns of online users these days and hackers are an
inevitable part of this discussion. Every part of our cyber world is influenced
by hackers and they exploit the vulnerabilities of systems to gain unauthorized
access..
Tuesday, April 26, 2016
Posted by Sivapriya
The 7 Most Wanted Iranian Hackers By the FBI

The Federal Bureau of Investigation (FBI) has lengthened its Most Wanted List by adding seven Iranian hackers who are
accused of attacking a range of US banks and a New York dam.
The United States Department of Justice (DoJ) charged seven.
WhatsApp’s end-to-end encryption: How to enable and what it means.

WhatsApp is now end-to-end encrypted at all times. This will ensure that a user’s messages, videos, photos sent over WhatsApp, can’t be read by anyone else; not WhatsApp, not cyber-criminals, not law-enforcement agencies. Even calls and group chats.
Penetration testing for your organization has never been easier.

Reback council offers a simple, easy-to-understand
suite of penetration testing services to commercial organizations throughout
the India. Reback council is a commercial product offering of Chameleon
Integrated Services, and can demonstrate a strong.
HORNET is New Tor-like Anonymity Network With Superfast Speeds

The Deep Web is a place that is hidden from the ordinary world because the browsers used to access the Deep Web, continuously encrypt user data. Due to this constant data encryption, the browsing speeds are slow. Our beloved Tor network has more than.
Top 10 safe computing TIPS

1.Patch, Patch, PATCH!
Set up your computer for automatic software and operating system updates. An unpatched machine is more likely to have software vulnerabilities that can be exploited.
2.Install protective software.
Sophos is available.
6 Statistics that Prove You Need Application Security Training

As well as protecting your applications and the sensitive
data they contain, improving your application security can save your
organisation a great deal of time and expense.
Good application security training is a crucial first
step to improving.
Saturday, February 27, 2016
Posted by Sivapriya