/IT Security

The first Specter and Meltdown exploits appear

Experts on IT security warn that soon all of us can expect big problems. According to multiple credible cybersecurity companies, criminals are already developing viruses that exploit meltdown and specter, a security bug that affects every Intel chip made in the past couple years.  The security analysts reported the detection of 139 different malwares that [...]

By | 2018-02-01T15:02:46+00:00 February 1st, 2018|IT Security, Software News|Comments Off on The first Specter and Meltdown exploits appear

Attacks against enterprise networks went up 40% in 2017

According to the research of a verified source, 2017 contained one of the highest increases in attacks against enterprise networks ever recorded. Over 12 months, 28% of industrial enterprises in the world were attacked in some way - in 2016 that number was only 20%.. These figures confirm the forecasts of security experts that in [...]

By | 2018-01-30T11:36:10+00:00 January 30th, 2018|IT News, IT Security|Comments Off on Attacks against enterprise networks went up 40% in 2017

A 2.4 million phone botnet that is still active today.

In the fall of 2016, a source announced the appearance of a new type of malware, Android Trojan DressCode,  a hidden malware which without the users knowledge, used the infected devices in a botnet.  The hacker who wrote it kidnapped confidential information even from secured networks by distributing it in applications for phones that anyone [...]

By | 2018-01-29T12:02:40+00:00 January 29th, 2018|IT Security, Software News|Comments Off on A 2.4 million phone botnet that is still active today.

A new extension to hide your digital fingerprint

In an age where it seems like every company is looking to extract and sell every drop of data it can squeeze out of users its a breath of fresh air to hear about a company that not only doesn't collect and sell your data, but actively alerts you to who your favorite websites are [...]

By | 2018-01-25T16:16:37+00:00 January 25th, 2018|IT Security, Software News|Comments Off on A new extension to hide your digital fingerprint

A flash drive that can blow up your computer?

A developer has found a way to modify the USB drive in such a way as to cause it to explode after being connected to a computer. The programmer, going by the pseudonym MG, designed a self-destroying "USB flash drive" from a normal USB drive with the possibility of installing malicious code on the victim's [...]

By | 2018-01-24T15:19:23+00:00 January 24th, 2018|IT Security|Comments Off on A flash drive that can blow up your computer?

Windows and Linux Servers Vulnerable to Virus-Mining

Specialists in cybersecurity from the IT Check Point companies, Ixia and Certego found that more than 700 servers on Windows and Linux are infected with the malicious software RubyMiner, used for the latent mining of cryptocurrency. The first attacks were noticed last week, but the epidemic took on a new face only a few days ago. Cybersecurity [...]

By | 2018-01-18T11:10:29+00:00 January 18th, 2018|IT news and stories, IT Security|Comments Off on Windows and Linux Servers Vulnerable to Virus-Mining

WPA-3, a more secure, versatile WiFi

The standards for WPA3, the latest in WiFi encryption has been announced and includes a slew of new security features.  The combination of the largest manufacturers of computer equipment and Wi-Fi devices, Wi-Fi Alliance, published the first details about the data protection protocol WPA3, which will replace WPA2 in the near future   The first [...]

By | 2018-01-10T14:54:01+00:00 January 10th, 2018|Hardware News, IT Security|Comments Off on WPA-3, a more secure, versatile WiFi

The biggest computer bug ever has a little brother, and its even more pervasive then before

If you're a passionate concurrent follower of the news on this blog, as Im sure thousands of you are out there, you more likely then not saw my article about the meltdown bug that was in all the news last week.  But for those uninitiated, I'll recap briefly.  It was discovered that their was a [...]

By | 2018-01-08T18:14:42+00:00 January 8th, 2018|Cell Phones, Hardware News, IT News, IT Security|Comments Off on The biggest computer bug ever has a little brother, and its even more pervasive then before

Morpheus: The Unhackable System

Cyber ​​security in recent years has become a huge area for investment not only for large corporations, but also for the military. In light of the WannaCry virus that destroyed more than 300,000 computers worldwide, it seems that it is time to create a system that cannot be hacked. The US military agency, DARPA (Defense Advanced Research Project [...]

By | 2017-12-21T11:21:12+00:00 December 21st, 2017|Hardware News, IT news and stories, IT Security|Comments Off on Morpheus: The Unhackable System

The Top 25 Worst Passwords of 2017

SplashData, a provider of information security services, annually compiles a list of the most popular passwords on the basis of millions of stolen logins, which eventually fall into open access. And every year we gawk at the ridiculous list and think, why would someone use that? You probably already guessed which two passwords are the [...]

By | 2017-12-21T10:58:31+00:00 December 21st, 2017|IT News, IT Security|Comments Off on The Top 25 Worst Passwords of 2017