Extended Validation SSL Increases Online Sales and Transactions by instiling Customer Confidence We are spending more time on the Internet then ever before. Internet is used for commerce, communication, research, collaboration, entertainment and social media. Web browsing is becoming more common on mobile devices, opening opportunities for new markets with online sales and account-based services. […]
Month: June 2016
Mobile Ransomware Targeting Android Users Has Quadrupled In One Year
The increase of cyber crime and malware infection has found the adoption of Android mobiles to further spread the use of ransomware. Reports done by Kaspersky have found that in the past year the amount of cyber attacks using ransomware to extort android users has almost increased four fold, affecting upwards of 136, 532 users between […]
3 Hacks In 6 Months Have released Over 400 Million American Private Records
While the media has society transfixed on Hillary Clinton’s email servers, what few are reporting on is the fact that over the course of the last half year, three separate hacks on federal databases have released the private information of over 400 million Americans. As reported by Softpedia, the most recent hack released the information on […]
‘Pleurobot’ The Robot That Crawls And Swims Like A Real Salamander.
Robotic Scientists at the École Polytechnique Fédérale de Lausanne In Lausanne, Switzerland have designed and created a biomimetic mechanoid based around the structure and movement patterns of the Salamander. Named the “Pleurobot:, the mechanical counterpart was designed with an articulated vertebrae that allows the robot to slither on both land or at sea. The robot […]
‘Decryptor Bart’ New Ransomware From The Creators of ‘Dridex’ And ‘Locky’
The creators behind Locky and Dridex, two forms of ransomware being used earlier this year are believed to have yet created another form of Ransomware, named ‘Decryptor Bart’. Although very similar to its predecessors, Bart is designed differently and bares the additional ability to bypass corporate firewalls and deny victims access to their files without […]
SHA – Secure Hash Algorithm
A Secure Hash Algorithm is a family of cryptographic hash functions published by the National Institute of Standards and Technology as a U.S FIPS standard. Cryptographic hash functions are mathematical operations run on digital data; by comparing the computed “hash” (the output from execution of the algorithm) to a known and expected hash value, a […]
Myspace Data Breach Exposes 472 Million Passwords.
An organisation in which specialises in maintaining a searchable database of thousands of credentials have reported a Myspace data breach that extends to almost 360 million victims. Today, it has exposed that they have added over 427 million user’s records to their immense database. Earlier this week, they have also added 167 million LinkedIn accounts. Unfortunately, MySpace […]
Warning! Latest Paypal Scam sneaks into Inbox under Government email.
Cybercriminals work day and night to create more effective ways of portraying themselves to be someone they’re not in the effort to steal confidential information over the internet. The latest phishing scam targeting PayPal users has seen the use of government emails in order to bypass junk and spam folders and make its way directly […]