Please click on image to expand. We have been constantly hearing news about all the cyber attacks that keeps happening around the globe. But until you have visuals you might now really understand the size and scale of the whole thing. This website is very visually appealing in the way everything is laid out and you can watch attacks as they happen in real-time. No wonder companies who don't investment in proper security are prone to falling pray to darknets around the world. [Check it out here]
Dav
Explore
- Play Tic Tac Toe online free
- Play Whack-a-Mole Online Free
- Bubble Shooter Online Free
- Make Money with ChatGPT (eBooks)
- World Watch
- Relaxing Sounds
- Happy Music
- Your Ad Here
- Contact | Send Tip | Ask a question
- Privacy Policy
- Talk to our personalized "Side Hustle Helper" ChatGPT
- Play Space Shooter Game Online Free
- Coloring Pages Free Download - Printable [Fantastic Worlds] [A4]
- Play Choose Your Own Epic Adventure Game Online Free
- The Ultimate Adventurer Personality Test
- What Type of Leader Are You? - Personality Test
- Diet Matchmaker: Get Tailored Diet Advice Here
- Play Hangman Challenge Game Online Free - Ultimate Word Guessing
Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts
Tuesday, January 6, 2015
This web-app will let you watch cyber attacks around the world in Real-Time
Please click on image to expand. We have been constantly hearing news about all the cyber attacks that keeps happening around the globe. But until you have visuals you might now really understand the size and scale of the whole thing. This website is very visually appealing in the way everything is laid out and you can watch attacks as they happen in real-time. No wonder companies who don't investment in proper security are prone to falling pray to darknets around the world. [Check it out here]
Friday, February 1, 2013
How to follow Good Password Hygiene
There is enough news these days of Social Networking sites getting hacked. Once that happens you the end user stand to loos your account and maybe even your friends get spammed. Once an account is hacked you could also loose all your information and get your lists of friends etc deleted. This seems to be a problem generally on the internet and there seems to be only one way to fight all of this. Maintaining good password hygiene -- on social sites and else where on the internet. There is no company that is not susceptible to being hacked and till such time that permanent solutions are not found. The responsibility of keeping you account safe is left to you. So here are a few steps you need to follow to ensure good password management for your account, and keep your account secure.
How to set your passwords and keep them secure
1. Your passwords should be at least 10 characters long
2. Should contain a mix of characters -- letters, symbols (^%#), upper case, lower case and numbers
3. Don't use the same password for multiple sites
4. Change your password every six months
What is a password and why is it important
1. When you create a login ID on any site, you also need a password.
2. Passwords when being created and stored are always shown in asterisk -(******).
3. It is what gets you into your favorite sites like Google+, Facebook and Twitter.
4. It should not be shared with anyone.
5. Should be stored in a secure place. You can use a number of password saving apps online or better still -- find a way to manage all your passwords locally and offline.
Disable Java on your browser for better password protection
1. Most account seem to be compromised through the Java loophole.
2. The U.S Department of Homeland Advisory also has this to say on disabling Java.
How to set your passwords and keep them secure
1. Your passwords should be at least 10 characters long
2. Should contain a mix of characters -- letters, symbols (^%#), upper case, lower case and numbers
3. Don't use the same password for multiple sites
4. Change your password every six months
What is a password and why is it important
1. When you create a login ID on any site, you also need a password.
2. Passwords when being created and stored are always shown in asterisk -(******).
3. It is what gets you into your favorite sites like Google+, Facebook and Twitter.
4. It should not be shared with anyone.
5. Should be stored in a secure place. You can use a number of password saving apps online or better still -- find a way to manage all your passwords locally and offline.
Disable Java on your browser for better password protection
1. Most account seem to be compromised through the Java loophole.
2. The U.S Department of Homeland Advisory also has this to say on disabling Java.
Tuesday, April 6, 2010
Chinese hacking of India's secure data causes alarm
Canadian and U.S researches at the university of Toronto monitoring the hacking of a shadow spy network over the period of eight months have tracked it to servers based in China and specifically individuals based in Chengdu in central China .
The report titled "Shadow in the Clouds" had launched an attack on Indian computers which transfered their control to Chinese control centers. Sensitive information from the Indian National Security and about 1.500 email from the Dalia Lama have already been stolen.
"I do not know what evidence these people have or what their motives are," said Chinese Foreign Ministry spokeswoman Jiang Yu. "We resolutely oppose all forms of cyber crime, including hacking."
The authors of the report, entitled "Shadows in the Cloud" and involving the Information Warfare Monitor and Shadowserver Foundation groups, said they weren't surprised by
The report describes a world in which governments are racing to militarize cyberspace, creating an environment ripe for crime and espionage.
Among the compromised systems subject to a massive data breach is the Shakti, the Indian Army's artillery combat and control system, as well as India 's mobile missile defense system known as Iron Dome, according to Indianexpress.com.
The eight-month investigation -- which researchers said is ongoing -- found that the Dalai Lama's office was targeted in the attacks between January and November 2009.
The malware used to compromise victims typically involved an element of social engineering, to convince recipients to open infected files. The attackers used PDF, PPT, and DOC files to exploit old and recent vulnerabilities in Adobe Acrobat and Acrobat Reader, Microsoft Word 2003 and Microsoft PowerPoint 2003.
The report concludes by warning that the selling points of cloud computing -- reliability, distribution, and redundancy -- are the very properties that make cloud services attractive to cybercriminals.
"Clouds provide criminals and espionage networks with convenient cover, tiered defenses, redundancy, cheap hosting and conveniently distributed command and control architectures," the report says. "They also provide a stealthy and very powerful mode of infiltrating targets who have become accustomed to clicking on links and opening PDFs and other documents as naturally as opening an office door. What is required now is a much greater refection on what it will take, in terms of personal computing, corporate responsibility and government policy, to acculturate a greater sensibility around cloud security."
Labels:
Chinese Hacking,
Dalai lama,
Hacking,
Indian Security systems,
Tech News
Subscribe to:
Posts (Atom)