Posts

Major Celebrity Hacks and How They Can Affect You

Image
 Last year news of celebrity hacks seemed to be everywhere after Celebgate, the name given by the media to the attack which, according to Celebuzz, compromised up to 600 prominent individuals’ iCloud accounts. The contents included racy personal photos of hacked celebrities that subsequently turned up on the tabloid site 4chan, and soon were all over the Internet. This year, the high-profile social hack target has been Ashley Madison, the dating site that promoted itself as specializing in extramarital affairs. Its membership list was stolen and published online, prompting an immediate media rush to find celebrity figures among the site’s clients—but the Ashley Madison hack was not just about celebrities. Companies across America are concerned that employees who signed up may be vulnerable to “spear phishing” hacks or other forms of cyberblackmail. Hacking Into Private Lives The fate of these celebrities hacks, it turns out, is not only a concern for the famous. In the Internet Age, an

No, porn websites aren't the most favourite haunt of hackers: Know which websites are:

Image
What kind of websites people avoid out of fear of attracting malware? Of course, these must be the shady ones such as those for illegal downloads, porn and gambling. No, these are not the most dangerous places to visit on the internet in terms of exposure to malware. The website that infects your computer with malware could well be the most innocuous one such as an e-commerce marketplace visited by millions.Maximum audience, maximum impact. According to a Cisco cyber security report, the top industries that pose a risk to you through their websites, depending on where you live, include aviation, media and publishing, agriculture and mining, food and beverage, insurance, automotive, and real estate and land management. The report says there is a reason for this phenomenon. Cyber attackers have their task easier and a wider audience to hit when they target websites that are commonly used. Websites that are used for utility purposes definitely have a wider audience than, say, a porn strea

Increased attacks on emerging Blockchain and cyber security threats

Image
 Increased Attacks on emerging blockchain solutions based on the past two years, 2020 may very well see a ‘next phase’ of attacker activity that should have CISOs on high alert: Acceleration of data breaches targeting individual information similar to those we have seen throughout last year – such as Equifax, the 198 million US voter registration breach, the IRS taxpayer information and the ongoing medical information breaches. New attacks upon individuals or entire systems as a result of the information mined from these breached records, or the use of it for identity theft or spoofing to access higher-profile assets or objectives Increased attacks and attempts upon Bitcoin and emerging blockchain solutions because of the high financial motivation, as well as the assertion that these systems offer stronger security and thus resulting confidence placed on these systems by the organizations that employ them. Social engineering has become the top-ranked attack vector, along with identity

Online dating in 2021: cyber safety precautions for women

Image
 Online dating has become a common phenomenon, with many apps and their ever-increasing user base. This new trend may turn out to be unsafe for various users. The solution is not to completely stop using them, but to ensure that you use them safely. It is not a hidden fact that men and women experience cyber crime differently. More so, women are more likely to face cyber stalking and online harassment than men. This article suggests a list of cyber safety practices for women that you must follow. From what we have seen in the cases we receive, the reasons for women being the primary victims can be: Lack of awareness of using dating platforms. Negligible interest in knowing about security measures. Perpetrators may find it easy to blackmail a victim for being present on online dating sites due to cultural stigma. Lack of familiarity with technological advancements. After taking a detailed look at the available cases, I have prepared the following guide. You can adopt the following secur

The Growing Need for a New Security Platform

Image
 The Growing Need for a New Security Platform The idea of a security platform is not new. Neither are the issues related to security and vendor sprawl inside  he an organization. The original idea behind the Next-Gen Firewall was to blend several products into a single platform to reduce IT overhead and simplify wiring closets that had been overrun with security devices. And it worked. NGFW solutions quickly became the cornerstone for security implementations in virtually every organization in the world. There were still challenges, however. Interoperability was one. For many of these solutions, the various technologies — usually some combination of a firewall, IPS, VPN, web filtering, AV, and sandbox solution —didn’t really work together as a single seamless solution. Many components used different operating systems and even had separate management consoles. Another issue was the quality of the solutions embedded in the platform. A security vendor that built an NGFW platform may have

Instagram Scams and how to avoid them

Image
Instagram has seen more than 1 billion accounts opened, and users on the service share close to 100 million photos every day. Instagram’s popularity may be down to the fact that it is a social media network like no other, offering a unique visual twist. Unlike Twitter and Facebook, the platform was specifically built around the sharing of images and videos. Instagram has become part of many people’s daily lives, as they use it to communicate and engage with their friends and family. There are also many businesses and influencers who use the platform to make money. But Instagram is not all happy videos and photos, showing off your new outfit, or boasting where you’re out eating dinner with your friend. Unfortunately, the popularity of the platform makes it an ideal place for cybercriminals to operate large-scale scams. This scamming has worsened over the past year, with the BBC claiming in January 2021 that Instagram fraud reports have increased by 50% since the coronavirus outbreak be

Reporting the cyber crime in India with just an e-mail

Image
" Yesterday only, I received a call on my mobile device from an unknown number. The anonymous caller presented himself as some bank officer who was in immediate need of my ATM card number and CVV". After politely informing him that I’m a law student, I did disconnect the call. "Well, not a new thing. Such happenings are way too common in our friend circle, family friends, and even ourselves and our parents. Law knowing persons including law professors, practitioners, and law students regularly receive phishing attempts, impersonating calls and emails on their electronic devices. What’s worse is that they choose to ignore such happenings. Thanks to the recent legal developments in the Indian legal system, we can report such incidents just by dropping an email or reporting it to the local cyber cell. What to report Any cybercrime can be reported following the undermentioned steps. Whether a person is asking for your secret information or someone threatening you over Facebo