Researchers Send Secure Passwords Using the Human Body

Sending passwords through an Internet connection or Bluetooth is not safe anymore so these researchers have developed a technology that sends passwords through nothing else but the human body. Researchers at the University of Washington have finally figured out a way to use a human body to transmit sensitive information such as your passwords and other […]

ORWL — First Open Source And Physically Secure PC, Runs Linux And Windows

Short Bytes: ORWL is the first open source, physically secure computer. Using a secure microcontroller (MCU) and an ‘active clamshell mesh’, the device makes sure that nobody breaks the security of the system. Its maker, Design Shift, has also launched a crowdfunding campaign on Crowd Supply. In today’s age, our most precious information is saved on our computers. We use […]

Bitdefender 2017 Is Here To Kill Ransomware And Secure Your Wi-Fi Connection

Short Bytes: Bitdefender is here with its new lineup of revamped antivirus solutions. This range includes Bitdefender Internet Security 2017, Bitdefender Total Security Multi-Device 2017, and Bitdefender Antivirus Plus 2017. The highlights of this release are enhanced ransomware protection and a Wi-Fi security scanner. Bitdefender, one of the most dependable antivirus solutions around, has launched the […]

Tails 2.6 — Ultra-secure Linux OS Used By Snowden Gets Updated Tor And Kernel

Short Bytes: The development team of Tails, the anonymity-focused Debian GNU/Linux-based Live CD operating system, is here with its latest release. Tails 2.6 fixes multiple bugs and improves the software packages. This release is based on Linux kernel 4.6 and Tor 0.2.8.7. While the existing Tails users can go for the update, new users need to […]

11 easy tips to secure your Mac against hackers

Today, it is still true that Mac has less malware problem than its counterparts Windows and Android. But, it does not mean that Mac is immune to hackers, or that Mac users should take its security lightly. In 2013 Reuters reported that some Mac operating systems of Apple employees were infected with malware. So, case […]

SWEET32 Attack: 3DES and Blowfish Ciphers Considered Insecure

HTTPS and VPN traffic broken with new semi-practical attack. Two scientists from the French Institute for Research in Computer Science and Automation (INRIA) have published new research that details an attack that recovers data from TLS (HTTPS) traffic that was encrypted with 64-bit ciphers, more precisely with Triple DES (3DES) and Blowfish algorithms. Encryption is a […]

OMG!! Accidentally Microsoft leaked backdoor Keys to BYPASS UEFI secure boot

Keys to BYPASS UEFI secure boot Microsoft accidentally leaked the Secret keys to BYPASS UEFI secure boot that allow hackers to unlock devices protected by UEFI (Unified Extensible Firmware Interface) Secure Boot feature. Secure Boot is a security feature that protects your device from certain types of malware, such as a rootkit, which can hijack your […]

Microsoft Creates Backdoor In Windows, Accidentally Leaks UEFI Secure Boot Keys

Short Bytes: Two researchers reported that Microsoft accidently compromised the golden keys to its UEFI Secure boot feature. The golden keys allow the developer to bypass the Window boot manager check and install a non-Microsoft OS on the machine. Microsft has released two patches to rectify the mistakes since then. It’s almost a week since […]

What really happened in mass Telegram secure messenger hack

Were 15 million Iranian accounts truly placed at risk?Telegram has fought back against researcher claims that Iranian cyberattackers have managed to compromise at least a dozen accounts on the secure messaging service and identified the phone numbers of 15 million users. This week, the Reuters news agency reported that the attack was the “largest known […]

How to secure your cyber infrastructure from threats like ransomware?

The Internet is a great place to do business and cybercriminals are aware of that fact so how can you protect your networks, systems and communications from cyber threats like ransomware? Let’s talk about that! Symantec’s newest threat report claims that email phishing scams have substantially declined in the last three years, but incidences where crypto-ransomware was used to encrypt […]

Riffle: MIT Creates New Anonymity Network Which Is More Secure Than TOR

Short Bytes: Researchers at MIT and EPFL have come up with a new anonymity network that is said to be more secure than Tor. It’s a mix network which implements methods like verifiable shuffle and Authentication Encryption. The researchers will showcase it at a tech symposium later this month. MIT is a place where a […]

How to do secure data destruction of information from storage devices?

There are statistical evidences supported by data destruction companies which present that in countries like Mexico, Brazil, United States, Colombia, Costa Rica, Argentina, UAE, and India; two out of three companies face data management problems & risks. Data should be appropriately managed across the entire data lifecycle, from capture to destruction. Data destruction process forms […]

How To Create A Super Secure Password To Defeat Hackers

Short Bytes: Deciding a security-focused password is tougher that one might think. Even the most security-conscious users commit the mistake of forming their passwords using personal information or other predictable combinations. Today, on the occasion of World Password Day, we bring to you an interesting infographic that tell you the tips to make the perfect […]

Qatar National Bank Declares Systems ‘Fully Secure’ Sequel To Cyber-attack

Following the recent security breach suffered by the Qatar National Bank has assured that its systems are “fully secure”. Sequel to a recent cyber-attack that led to a large chunk of files purportedly stolen from the financial institution’s systems being dumped online, Qatar National Bank has assured that its systems are “fully secure”. The bank […]

Hacker exposes thousands of insecure desktops that anyone can remotely view

VNC Roulette allows you to randomly view insecure desktops accessible over the internet. Recently, a new website has come up on the Internet, which allows visitors to view random screenshots taken off computers that were not properly secured and are available via the Internet. The website, called VNC Roulette, has given a whole new meaning to […]

Subgraph OS: Secure, Free, Open Source Linux Operating System For Non-technical Users

Short Bytes: To answer your security related concerns, Subgraph OS is here as a free, secure, open source Linux operating system for the non-technical users. This security-focused distro comes with complete TOR integration, full-disk encryption, OpenPGP mail integration, system hardening and other features. Know more about the OS and make your system secure. In the recent […]

How to secure databases?

Databases can be a treasure trove of confidential data. Normally most databases contain confidential information, private data of companies, people, intellectual property, employees or customers. Confidential data may include the customer data, employee’s salary data, employee address data, patient records, financial data, credit card numbers and much more. From a database security company’s point of […]

Gmail to warn you if your friends aren’t using secure e-mail

Messages coming to or from non-encrypted sources will be flagged by Google. Google has confirmed a number of changes to Gmail with the arrival of two new features that will let you know if the people you’re corresponding with aren’t hip with TLS encryption. The alterations are fairly subtle: when you receive a message from, […]