The Benefits Of An Extended Validation (EV) SSL Certificate

Extended Validation (EV) Green Bar Https

Extended Validation SSL Increases Online Sales and Transactions by instiling Customer Confidence We are spending more time on the Internet then ever before. Internet is used for commerce, communication, research, collaboration, entertainment and social media. Web browsing is becoming more common on mobile devices, opening opportunities for new markets with online sales and account-based services. […]

3 Hacks In 6 Months Have released Over 400 Million American Private Records

Private Records Released

While the media has society transfixed on Hillary Clinton’s email servers, what few are reporting on is the fact that over the course of the last half year, three separate hacks on federal databases have released the private information of over 400 million Americans. As reported by Softpedia, the most recent hack released the information on […]

‘Pleurobot’ The Robot That Crawls And Swims Like A Real Salamander.

Robotic Scientists at the École Polytechnique Fédérale de Lausanne In Lausanne, Switzerland have designed and created a biomimetic mechanoid based around the structure and movement patterns of the Salamander. Named the “Pleurobot:, the mechanical counterpart was designed with an articulated vertebrae that allows the robot to slither on both land or at sea.  The robot […]

‘Decryptor Bart’ New Ransomware From The Creators of ‘Dridex’ And ‘Locky’

The creators behind Locky and Dridex, two forms of ransomware being used earlier this year are believed to have yet created another form of Ransomware, named ‘Decryptor Bart’. Although very similar to its predecessors, Bart is designed differently and bares the additional ability to bypass corporate firewalls and deny victims access to their files without […]

SHA – Secure Hash Algorithm

Secure Hash Algorithm

 A Secure Hash Algorithm is a family of cryptographic hash functions published by the National Institute of Standards and Technology as a U.S FIPS standard. Cryptographic hash functions are mathematical operations run on digital data; by comparing the computed “hash” (the output from execution of the algorithm) to a known and expected hash value, a […]

Myspace Data Breach Exposes 472 Million Passwords.

An organisation in which specialises in maintaining a searchable database of thousands of credentials have reported a Myspace data breach that extends to almost 360 million victims. Today, it has exposed that they have added over 427 million user’s records to their immense database. Earlier this week, they have also added 167 million LinkedIn accounts. Unfortunately, MySpace […]