Contrary to what most internet users believe, only about four percent of the web is actually visible to the average person. That means approximately 96% of the world’s biggest public network remains in the dark, access only through TOR. And as we know, this is where many of today’s exploits, attacks, and malicious plots are
Stolen bank details, credit card info, and plenty of other damaging information are now for open sale on the dark web—it’s no secret. For a few years now, it has been the place to trade illegal merchandise of all kinds, including the personal information of those scammed by phishing attacks and similar exploits. While this realization
In a recent intelligence report, the U.S. Department of Homeland Security has revealed serious weaknesses in Gmail’s new interface, many of which appear to be highly exploitable. As a top email service released in April 2004, Gmail has become the de-facto mode of digital communication for many people, especially those using an Android mobile device.
When reviewing their networks and PC installations for unchecked/overlooked attack surfaces, system administrators should always be alert. By definition, an attack surface is the area of a computer installation where an attacker can breach the system. For this reason, it is a critical job for system admins to maintain a computing environment with minimal attack
The cryptocurrency trading scene now defines the old adage, “every man for himself.” Without any form of government or state-backed regulation, a blockchain-based currency such as Bitcoin and its derivatives must rely solely on speculation to assess the flow of trading. With all the recent interest in this form of trading and the nature of their
The time of ransomware at the top of the malware food chain is over, statistics from Kaspersky shows that there was a massive increase in incidents of ransomware infection in 2016. As per their findings: “The total number of users who encountered ransomware fell by almost 30%, from 2,581,026 in 2016-2017 to 1,811,937 in 2017-2018.
May 12, 2017, will always be remembered by the corporate world, especially the healthcare industry as a date when a new cyber-extortion racket, the WannaCry malware was unleashed and no cybersecurity software was able to anticipate it. It took advantage of a flaw in Server Message Blocks (SMB) version 1.0 to penetrate an otherwise security-hardened
Android has been on the market since 2008, and this year 2018 marks a decade of dominance in the world of mobile platforms. As part of being dominant in the mobile computing market comes the reciprocal risk of being targeted by cybercriminals. Android, due to its open platform nature enables users the capability to install