Another large scale data breach has happened in the Healthcare Industry. Know more about it.
Continue reading “The Anthem Hack”
96% say ISO 27001 is important for improving security defenses
Already established as international best practice, the information security management standard ISO 27001 has become an effective weapon in the fight against cyber crime. It is therefore unsurprising 96% of respondents to a new survey say that ISO 27001 plays an important role in improving their company’s cyber security defenses.
Is It Possible to Track Smartphone Location By Monitoring Battery Usage?
Data leaks through power consumption? Don’t be surprised because security researchers have discovered a way to track your every move by looking at your Android smartphone’s consumption of the battery power,even if you have GPS access unable.
Researchers at Stanford University and Israeli Defense Research Group, Rafael, have developed a new technology, which they have dubbed “PowerSpy”, that have capability to gather the geolocation of Android phones by simply by measuring the battery usage of the phone over a certain time.
Read the full article here.
Memory Map Shows You What’s Taking up Space in Android
No matter how much space you have on your phone or tablet, you’ll eventually fill it up. If you’re running low on space, Memory Map will show you what’s using up the all that storage.
Onion.City — Search Engine for Deep Web that Works From Normal Web Browser
There is an entire section of the Internet that you probably don’t see on daily basis, it’s called the "Darknet" or "Deep Web", where all browsing is done anonymously.
Onion.City, a new search engine for online underground markets that makes it more easier to find and buy drugs, guns, stolen credit cards directly from your Chrome, Internet Explorer or Firefox browser without installing and browsing via Tor Browser.
New global report highlights ATM industry trends
At the ATM Industry Association’s 2015 U.S. conference, ATM Marketplace unveiled the fourth edition of its new ATM Future Trends 2015 report, an in-depth examination of the market forces currently working to shape the short-term outlook for the ATM industry. The Tri-annual global industry report is for the first time being offered at no charge.
How to Test Your PC for the New “Superfish” Security Vulnerability
Security researchers have discovered a vulnerability in a piece of adware called Superfish that makes your computer vulnerable to all kinds of attacks. Superfish ships preloaded on many Lenovo computers, but can also be installed on any machine.
Google releases Cloud-based Web App Vulnerability Scanner and Assessment Tool
Google has unleashed its own free web application vulnerability scanner tool, which the search engine giant calls Google Cloud Security Scanner, that will potentially scan developers’ applications for common security vulnerabilities on its cloud platform more effectively
Carbanak APT – The Great Bank Robbery
Kaspersky disclosed recently that starting late 2013, many banks and financial institutions spread across the world have been the target of a very customized Advanced Persistent Attack. Kaspersky estimates that the combined losses could touch USD 1 Billion.
Continue reading “Carbanak APT – The Great Bank Robbery”
What is HTTP/2 ? Next-Gen Protocol For Faster and Safer Internet
Good news for Internet folks! Get Ready as the entire web you know is about to change. The new and long-awaited version of HTTP took a major step toward becoming a reality on Wednesday – It is been officially finalized and approved.