Category: General
-
How does The Internet Work?
So, how does the internet work? The internet is something nearly everyone uses on a daily basis. We’ve all come to rely on it and some of us make our living using it. So, how does it work? How do computers connect? How do messages pass between computers? Is it really a bunch of tubes?…
-
36 Reasons Why Having a “Free Website” is a Bad Idea
This is a great article explaining exactly why you get what you pay for and nothing is ever “free.” The least of which is they can lock down your data, they can shut down your website, unprofessional web address (no credibility there), the company can disappear (with your stuff), you lose your site address, they…
-
What to Expect from Cybersecurity in 2016, According to the Hacktivists Fighting ISIS | Hacked
According to Ghost Security Group, 2016 will be an eventful year in cybersecurity. Ransomware, ISIS, Bitcoin, hacks and breaches will likely paint the headlines as they did in 2015. “As was seen recently with the Ransom32 software earlier this year, ransomware is only getting better,” Ghost Security Group activist Akenalus told Hacked. “At some point…
-
Report: Cybercriminals Are Cooking up Malware in Record Numbers | Hacked
Report: Cybercriminals Are Cooking up Malware in Record Numbers A press release by the Spanish security company revealed the startling number to be nine million new samples more than the previous year – 2014. Essentially, that’s 230,000 new malware samples produced every single day on average throughout 2015. 2015 also saw another record notched up…
-
Apple Can Still Read Your End-to-End Encrypted iMessages | The Hacker News
Apple Can Still Read Your End-to-End Encrypted iMessages | The Hacker News If you are backing up your data using iCloud Backup, then you need you watch your steps NOW! In government fight against encryption, Apple has positioned itself as a staunch defender of its user privacy by refusing the federal officials to provide encryption…
-
When URL Shorteners and Ransomware Collide
When URL Shorteners and Ransomware Collide We are all very familiar with URL shortening services, which are regularly used in Tweets and other social media. It is no secret that cyber criminals also use URL shorteners to aid them in achieving their objectives. URL shorteners are often used by cyber criminals to obfuscate redirects to…
-
Password secrets: Your Passwords Aren’t As Secure As You Think
Password secrets: Your Passwords Aren’t As Secure As You Think – Technotification There is one thing that make us so vulnerable is ignorance. Today, everything is going to be depended on the internet. Yes, and you know it better! and a concept that we use to secure our internet accounts and all is our passwords.…
-
Hackers Install Free SSL Certs from Let’s Encrypt On Malicious Web Sites
Criminals are abusing Let’s Encrypt Certificates TLDR How can You Prevent Yourself From Such Attacks? Trend Micro has reached out to both the Let’s Encrypt project, and the legitimate domain’s owner to notify them about the malvertising campaign. And Here’s your take: Users should be aware that a ‘secure’ website is not always or necessarily…
-
Pioneer In Internet Anonymity Hands FBI A Huge Gift In Building Dangerous Backdoored Encryption System | Techdirt
Rockin’ Encryption, Open Back Door… Few doubt Chaum’s cryptography skills or pedigree. He was instrumental in the early days of computer cryptography and what anonymity we have online today owes a lot to Chaum. But his latest plan is… troubling: At the Real World Crypto conference at Stanford University today, Chaum plans to present for…