Encoding vs. Encryption vs. Hashing
V.P.PRABHAKARAN Info.Sec Consultant CEH | ECSA | CHFI | OPST | OPSA | GWAPT Encoding is often confused with encryption […]
Encoding vs. Encryption vs. Hashing Read More »
V.P.PRABHAKARAN Info.Sec Consultant CEH | ECSA | CHFI | OPST | OPSA | GWAPT Encoding is often confused with encryption […]
Encoding vs. Encryption vs. Hashing Read More »
Automating the search for loopholes in software “SET a thief to catch a thief.” Security-conscious companies, from banks to newspapers,
Hacking the hackers Read More »
President Obama issued a broad and far-reaching cyber security executive order Wednesday that allows the executive branch to unilaterally financially target foreign-based
Obama Declares Hacking a ‘National Emergency’ Read More »
Loziok trojan used to siphon confidential data out of infected computers. Researchers have uncovered an ongoing espionage campaign that uses
Energy companies infected by Loziok trojan Read More »
It’s only rock and roll but hackers like it The Eurovision Song Contest has been targeted by obsessed hackers who
Eurovision Song Contest hacked Read More »
The website of Air France’s national mutual society has been hacked by a group claiming to be the Mujahideen in Algeria. The
Air France website hacked by ‘Algerian Mujahideen’ Read More »
GitHub is still in the throes of a massive DDoS attack which has blighted the site since Thursday. While the
GitHub hit by its biggest DDoS attack ever Read More »
As a general rule of thumb, anything that transmits information to or from your computer is a way hackers can
Hackers can steal passwords via wireless mouse Read More »
It is estimated that millions of computers contain vulnerabilities in the local BIOS chip which is (Basic Input / Output
More Details on the BIOS Vulnerability Read More »