Browsing tag

Cyber Security

Trape – People Tracker on the Internet – Kali Linux 2017.3

Trape is a recognition tool that allows you to track people, the information you can get is very detailed. We want to teach the world through this, as large Internet companies could monitor you, obtaining information beyond your IP. Trape: https://github.com/boxug/trape Some benefits One of its most enticing functions is the remote recognition of sessions. […]

MoneyTaker Hackers are Attacking American, Russian And Bangladeshi Banks

MoneyTaker hackers, A group of Russian hackers, has been laying waste to banks internationally and locally. In the past 18 months, this group has stolen a total of $10 million from America and Russia combined and $81 from Bangladesh. This group is a large one and their recent heists happened when they hacked into 20 […]

Cyber Security And The Challenges In 2018

As we move into the year 2018 we see how the cyber security is getting tough. Criminals are innovating their modus operandi to breach the systems. We have seen how in 2017 they were a step ahead. The evolution is going on. Taking a cue from what happened to Equifax, Verizon, Kmart the organizations that […]

Five – Point Cyber Security Manual for Companies

Businesses today are obliged to protect tonnes of information- corporate business data as well as sensitive personal data of customers. We’ve seen companies, big as well as small ones, crumbling to dust as a consequence of data breaches, most of which could have been avoided, had they taken adequate cyber security measures. A sound cyber […]

It Should be Cybersecurity and not IT security

The Cyber Security Summit organized by the CII (Confederation of Indian Industry) insisted how India should move from IT security to Cyber Security. The speaker raised his concern and asked the organization to set the ball rolling and put in place certain legality to arrest the menace of the cyber threat. Nilesh Mhatre, Chief Information […]

Face ID just got Hacked with the help of a mask by a security firm

Apple uses the Tenth Anniversary iPhone X Phone to replace Touch ID. Because the award handset features an edge-to-edge protection and has very slim bezels, Apple had to get up with a way to reinstate the fingerprint scanner that powers Touch ID. So the group in Cupertino decided to use a facial identification system to […]

Keep Your Small Business Safe: What You Need to Know about Cyber Security

Small business make up more than 70% of the targets that cyber criminals go after. They are the most targeted for several reasons including the fact that they have less security to begin with and they use public forms of keeping connected to their employees. It has been found that small businesses have a really […]

No Prison for Student who Developed Spam Botnet to Pay College Fee

Sean Tiernan, 29 from Santa Clara, California was given 24 months probation on October 30th for his involvement in developing a massive spam botnet that infected more than 77,000 devices to send spam and make money for his college fee. The good news for Tiernan is that he is not facing any prison time for his crime since […]

Blockchain Technology to Protect E-commerce business data

As we know how Equifax is still under the impact of the massive cybersecurity breach on its computers, and as it reels under this breach, lest not forget this attack happened somewhere in mid-May and June 2017. The personal data of 140 million Equifax customers were taken off by the cyber criminals. We have also […]

With the advancements in Cyber Security, Hackers and DDoS are more Prevalent than ever

2016 has had its fair share of record-setting cyberattacks and security breaches emphasizing how much the security landscape has evolved. Cloud-based application delivery platform Incapsula reported a massive 650 Gbps distributed denial-of-service (DDoS) attack on its network. Today, things are much worse. 2017 has been the worst year to date with increasing number of DDoS attacks. The […]

Healthcare Industry and Cyber Breaches

Guess what happens one day that a busy hospital stops functioning. All the data related to the patient and treatment details seize to work. There is no output, and they all stand still. Yes, the computerized system of the environment has choked, and all the electronic medical records are locked. A hacker could barge into […]

Canada’s Spy Agency Releases its Cyber-Defense Tool for Public

The Communications Security Establishment (CSE), Canada’s main signals intelligence agency, has made a malware scanning and analytics tool called AssemblyLine as open-source by releasing the code. AssemblyLine tool can analyze massive volumes of files and also rebalance workload automatically. During the scanning process, every file is given a unique identifier, and user-defined analytics engines scan […]

Musgrave Group hit by a Cyber Attack

Musgrave, the Irish retail group is the latest victim of the recent cyber attack. The group has confirmed that it was subject to attack, which has impacted its Centra, SuperValu and Daybreak stores. And it is feared that two-thirds of all economic crimes suffered by Irish businesses will be cyber-related by 2019. Looks like a […]

Apple co-founder Steve Wozniak Launches ‘Woz U’ Online Tech Education Platform

Steve Wozniak nicknamed “The Woz” known as a coding genius and co-founder of the tech giant Apple along with late Steve Jobs has launched his online technology related education platform called “Woz U.” The platform will help people polish their skills that will ultimately lead them to a successful career in the growing tech industry.  According […]

VHostScan – Virtual Host Scanner

A virtual host scanner that can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages. First presented at SecTalks BNE in September 2017 (slidedeck). Key Benefits Quickly highlight unique content in catch-all scenarios Locate the outliers in catch-all scenarios where results have dynamic content on the page (such as the time) […]

BaRMIe – Java RMI Enumeration & Attack Tool

BaRMIe is a tool for enumerating and attacking Java RMI (Remote Method Invocation) services. RMI services often expose dangerous functionality without adequate security controls, however RMI services tend to pass under the radar during security assessments due to the lack of effective testing tools. In 2008 Adam Boulton spoke at AppSec USA (YouTube) and released […]

Nzyme – Wireless Monitoring, Intrusion Detection & Forensics

Nzyme collects 802.11 management frames directly from the air and sends them to a Graylog (Open Source log management) setup for WiFi IDS, monitoring, and incident response. It only needs a JVM and a WiFi adapter that supports monitor mode. Think about this like a long-term (months or years) distributed Wireshark/tcpdump that can be analyzed and filtered […]

Britain’s NCC Says WannaCry Was The Year’s Biggest Test

UK’s National Cyber Security Centre states that the WannaCry ransomware was the biggest test of the year. The NCSC (National Cyber Security Centre), which was founded last year, has made this observation in its first annual review. The NCSC was launched in October 2016 with an objective to help UK’s “…critical services from cyber attacks, […]

Deloitte Cyber Attack can Affect High-Profile Blue-Chip Clients

Major professional services firm Deloitte has been targeted by a cyber security attack and reports say that the attack could have led to the breach of the confidential emails and plans of some of the blue-chip clients of the company. As per reports, Deloitte came to know of this breach a few months earlier, but […]

NCSC Intensifies Cybersecurity Across UK Public Sector

The National Cyber Security Centre (NCSC), UK has introduced four ‘Active Cyber Defence’ (ACD) programmes aimed at improving basic cyber security measures across the UK public sector. This initiative is expected to benefit UK businesses, and these businesses would be able to utilize the ACD services directly in the future. The massive increase in cyber […]