Loading...

Articles on Cyber Security

Facebook's latest figures showing growth in global users also suggest as many as 83 million may come from dubious sources -- duplicate accounts, pages for pets and those designed to send spam.
Facebook members grew to 955 million at the end of the second quarter, but some 8.7 percent may be dodgy, the company said in its quarterly filing with the US Securities and Exchange Commission.
There are "inherent challenges" in measuring usage "despite our efforts to detect and suppress such behavior," the social network said.

With the growth of the Internet, computer security has become a major concern for businesses and governments. They want to be able to take advantage of the Internet for electronic commerce, advertising, information distribution and access, and other pursuits, but they are worried about the possibility of being "hacked." At the same time, the potential customers of these services are worried about maintaining control of personal information that varies from credit card numbers to social security numbers and home addresses.

Never respond to emails that request personal financial information
Banks or e-commerce companies generally personalise emails, while phishers do not. Phishers often include false but sensational messages ("urgent - your account details may have been stolen") in order to get an immediate reaction.

New Delhi: An inactive website of the Southern Railways www.southernrailway.gov.in has been defaced apparently by Pakistani hackers.
The hacker group that calls itself ‘Pak Cyber Pyrates’ replaced the home page of the website with a page with content that denounces India’s role in Kashmir.
The official Southern Railways website moved to a new domain www.sr.indianrailways.gov.in back in 2010.

Security researcher Jonathan Brossard created a proof-of-concept hardware backdoor called Rakshasa that replaces a computer's BIOS (Basic Input Output System) and can compromise the operating system at boot time without leaving traces on the hard drive.
In short, firmware is software that is stored in non-volatile memory on a computer chip, and is used to initialise a piece of hardware’s functionality. In a PC, the BIOS is the most common example of firmware but in the case of wireless routers, a whole Linux operating system is stored in firmware.

On Friday, Reuters blog platform was hacked with false posts and on Saturday, the @ReutersTech account on Twitter was taken over and renamed @TechMe. False tweets were sent before it was taken down.

The first attack came Friday after Syrian hackers loyal to President Bashar al-Assad allegedly gained access to Reuters’ blogging platform, which they used to post a fake interview with rebel Free Syrian Army (FSA) leader Riad al-Assad. The interview essentially said the general was withdrawing troops after a battle.

26-year-old Slovenian hacker known as Iserdo stands thought to have been behind the Mariposa botnet is on trial in Slovenia, charged with having masterminded an international cybercrime gang.

At its height, the Mariposa botnet infected up to 12.7 million PCs, with more than half of the Fortune 1,000 companies believed to have been compromised, including 40 major banks. Once a computer had been compromised and brought into the botnet, operators could steal information from innocent users - including credit card details and banking passwords.

"I am sorry Papa. I am committing suicide," said a text message from Rekha Singh, second year polytechnic student in electronics stream, to her father Ranjeet, a WCL manager at Kamptee. The 22-year-old Rekha had been afraid to face her father since she had lied to him about her repeated failures. She jumped to her death from the third-floor balcony of her hostel within a minute of sending the SMS.

Seth Horvitz ordered a Westinghouse 39-inch LCD for about $320 from a third-party electronics seller on Amazon and was shocked to see what he got a military-grade assault rifle.
He received a delivery via UPS ground, a HUGE oblong box that arrived at this door step.

When I saw some metal parts inside the box, I thought, ‘Maybe this is a TV stand or mount or something,’” Horvitz said in a phone interview with Wired.
“When I realized it was an assault rifle, it was pure shock and disbelief.”

What is Ip Address?
You might have come across this term very often, haven’t you! Every machine on the Internet has a unique identifying number, called an IP Address. A typical IP address looks like this: 216.27.61.137, 921.168.1.6, 59.22.1.1 etc.
What is the use of IP Address?