It is generally quoted that “ The more information you have, the more you are ahead in the war…” We all know this thing that iOS and Android are among the top mobile OS when it comes to choosing user interface, functions, and compatibilities. There is no doubt on this fact that the market set by Google has a big number than its counterpart iOS, but what matters to us is who cares about our privacy more! As we move forward, we all are building are future more on automation and when the word automation comes to our mind, we have a slighter inclination towards Artificial Intelligence and Machine Learning.…
-
-
HACKERS CAN USE TELEGRAM TO FIND THE EXACT LOCATION OF YOUR HOME!
Telegram has too introduced a similar feature of People Nearby by enabling which any user can find the nearby persons and start a chat with them. But this feature can pose your privacy too at risk and an attacker can easily be able to see where do you live and what are you doing.
-
THIS CRYPTO MINING TROJAN HAS INFECTED MORE THAN 15000 SERVERS. IS YOUR NEXT?
Experts have researched a Miner Trojan named TopMiner that uses the methodology of SSH blasting attacks- an attack which results due to weak passwords or vulnerable SSH accounts to get into the servers. After successfully attacking the vulnerable servers with the trojan, malware downloads the SSH blasting program and some other scripts to take-over the root account for the Linux systems with port 22 open available on the network.
-
THE TRANSPARENT BLOCKCHAIN: CATCHING CYBERCRIMINALS FROM THEIR ANONYMOUS WORLD
We all know that cryptocurrencies are the only way to do anonymous transaction. Either it is FBI or NIA, they find it impossible to track the record of transaction made through cryptocurrency. Every technology geek in today’s time have tried to understand the concept of cryptocurrency due to its growing popularity. In many countries, the cryptocurrency is banned but still it a trending currency in the cyber criminal underground world. But do you wonder what makes it trending in the underground? Well the answer for this question is straightforward. As said above, the cryptocurrency provides a way to cyber criminals to make their transactions absolutely anonymous. What this means is…
-
REVOCATION OF CERTIFICATES EVADE TRUST FROM LEGAL SITES
While surfing website from modern web browsers like Chrome, Safari, Edge, in the top URL bar, you’ve definitely encountered a lock sign. This lock sign makes a good impression on your mind either it is a legal site or a phishing website. There are many chances that when the website shows you the warning “Your connection to this site is not private”, that website no longer exist in your good books. But what if a valid site gets a tag of insecure connection? Same thing has been happened with around 2000 websites out there on the internet, observed by researchers from Netcraft. On 11 July, Digicert(a Certificate Issuing Authority) revokes…