Tag "Hacking"

Back to homepage
Software

Hacking healthcare: A call for infosec researchers to probe biomedical devices

It is a brave new connected world out there and there is no shortage of cybersecurity risks associated with everything we do. We can’t even be sure that the technologies

Expert Articles

Database Hacking & Its Prevention

By Arpit Jain, Cyber Security Engineer at NetWeb Software, SQL Stands for Structured Query Language. It’s a standard language to access, read & write databases. It is a simple language

Identity Theft

Firms pay more to bosses following a security breach and invest less in R&D, new study finds

Bosses get paid more after cyber security breaches to maintain their firms’ reputation, research and development spending gets cut, a study finds. Security breaches in firms have been on the

Industry Insights

Is it time we raised expectations of politicians on cyber security?

Given the public perception that politicians are a bit clueless on tech/security issues, UK-based cyber security/ethical hacking firm Redscan decided to poll all 650 UK MPs to understand their thoughts

Expert Articles

Social Engineering: A Threat to Social Networking

By Arpit Jain, Cyber Security Engineer at NetWeb Software, Social engineering is a popular hacking technique with wide range of spiteful activities practiced through human interactions. It uses psychological manipulation

Industry Insights

Increasing security measures are driving cybercriminals to alter their techniques

Increased security measures and awareness are driving cybercriminals to alter their techniques in search of a better return on investment (ROI). Total recorded vulnerabilities year over year. Source: X-Force Red

Hardware/Network

What is an advanced persistent threat (APT)? And 5 signs you’ve been hit with one

Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack. An advanced persistent threat (APT) is a cyberattack executed

Hardware/Network

Hacker behind Collection #1 credential database identified

The threat actor was believed to be working on this breach for over two to three years. Known by the pseudonym ‘C0rpz’, it was hinted that there was more than

Identity Theft

Airbus Suffers Data Breach, Some Employees’ Data Exposed

European airplane maker Airbus admitted yesterday a data breach of its “Commercial Aircraft business” information systems that allowed intruders to gain access to some of its employees’ personal information. Though

Industry Insights

Poacher Enabled Cyber Resilience

I don’t for one moment feel that any professional would argue that we are not facing a time of Digital instability in our interwoven words of Business, Social Media, or