Cyber-warrior experts have unearthed that to hack an ATM machine, all you need is a RM100 chip, technical expertise and a malware obtained over the Internet to hack Automated Teller Machines (ATMs)!
As a basis of the attack,the hacker knows with pre-assessment planning where the locks and connections are, the model of the machine, the level of security and the version of the operating system. Continue reading
Today no one having time to meet everyone personally…In such a world if something is there which connects people from one corner of the world to other than its Social Networking Sites. As Teens are always active on Social Networking Sites so they are majorily focused by the Attackers. Continue reading
The fact that your regular e-mail client doesn’t let you send/receive large files, files beyond a certain limit? Well, you’re not the only one. Don’t you always wish you had something, an online tool or a website for that matter that could help you send/receive large data with ease. After all breaking your data into little chunks when sending can be a daunting task. Here are websites that you should try it out. Continue reading
1. Cross site scripting (XSS)
The problem: The “most prevalent and pernicious” Web application security vulnerability, XSS flaws happen when an application sends user data to a Web browser without first validating or encoding the content. This lets hackers execute malicious scripts in a browser, letting them hijack user sessions, deface Web sites, insert hostile content and conduct phishing and malware attacks. Continue reading
Advancements in technology never cease to amaze you,but the pic is a show stopper.
The app can scan moles and lesions to detect whether they are likely to become malignant. Its developers at the University of Houston say it has an 85% accuracy rate.
BERLIN – An employee of Germany’s foreign intelligence service is suspected of spying for Washington on a parliamentary panel probing US surveillance, media reports said Friday.
The federal prosecutor general confirmed that a 31-year-old German was arrested Wednesday on suspicion of acting for a foreign intelligence service, without specifying which one.
Information security, which most people know as ‘cyber’ security, is hard to sum up in just a few sentences (or even a paragraph). The textbook definition is ‘maintaining the confidentiality, integrity and availability of information assets’, but in the real world this requires skill in a wide range of specialist areas: cryptography, network architecture and engineering, secure coding and software development, penetration testing, intelligence, threat assessment, and management, to name just a few.