The Aadhaar Data Breach : Truth Behind The Story

The Aadhaar Data Breach : Truth Behind The Story

THE AAM AADMI KA ADHIKAAR Aadhar card nowadays is one identity proof that is required by each and every person in India. The applicability of the Aadhar card is irreplaceable as can be seen in the present scenario. Mobile numbers, Gas bookings and each connection...

Hackers Could Abuse Sex Robots To Harm People

Hackers Could Abuse Sex Robots To Harm People

Hacking in IoT devices We are all literate about the kind of damage hackers can do to precious data and the kind of havoc that can wreck. Recent events with ransomwares and data leaks ( a la Equifax) showed us that hackers are indeed capable of harming lives, stealing...

Blockchain- A Revolution in Cyber Space

Blockchain- A Revolution in Cyber Space

2008- BITCOIN RISES TO POWER In 2008 Bitcoin made its entry into the financial market. Most of the financial Advisors and forecasters believed that it would be a currency that would catch on only on the lower level financial groups or criminals. But as time passed...

Ransomware: The Worrying Trends And Necessary Precautions

Ransomware: The Worrying Trends And Necessary Precautions

2018 is being welcomed as a year when data protection and network security are going to play more important roles than ever. Ransomware is the latest but not newest threat to cyber security that has given many a CTOs and CIOs, the proverbial sleepless nights. With...

All About Cryptocurrency – Facts You Need To Know

All About Cryptocurrency – Facts You Need To Know

What is crypto currency? A cryptographic currency is advanced or digital cash supposed to behave as a medium of exchange. It makes use of cryptography to secure and take a look at exchanges and also to manipulate the production of latest devices of particular digital...

MySQL is Vulnerable to Server Root Access Vulnerability(Exploit Released)

MySQL is Vulnerable to Server Root Access Vulnerability(Exploit Released)

Critical vulnerabilities have been found in one of the most popular databases i.e. MySQL. David Golunski, a security researcher discovered two zero days, which allow an attacker to access the complete database. All the current supported versions of MySQL are...

PHPMailer Remote Code Execution Vulnerability

PHPMailer Remote Code Execution Vulnerability

PHPMailer is world’s one of the most popular and frequently used code for sending email from PHP based applications, with an estimated 9 million users worldwide. This is being used by many open-source projects like WordPress, SugarCRM, Drupal, Yii etc. Polish...

Apple Announces Bug Bounty Program

Apple Announces Bug Bounty Program

In a well-known computer security conference “Black Hat 2016”, Apple announced that they are going to launch their bug bounty program very soon After big IT companies like Google, Facebook and Microsoft now Apple is going to take a crucial step for the security of...