Human gullibility is weak There are several methods that are exploited by hackers; however, the primary method is the gullibility of humans. In a survey undertaken by Microsoft, it was found that individuals continue to remain the weakest link in the cyber security chain. The study is a part of the internet theft campaign that Read more
Archive : Security
Fed and ISPs Working to Provide Cyber Security
Fed and ISP teams up to offer cyber security The Department of Defense and the Department of Homeland Security are teaming up with Internet Service Providers to offer more cyber security to defense contractors. An experimental program called the Defense Intelligence Base Cyber Pilot is under progress where the Defense department is sharing confidential data Read more
Cyber Hackers Steal Users Information From Sega
Here is a bad news that the Gaming giant Saga now has become the latest hacking victim regarding its user data, which has now exposed along with over millions of customer affected. Not only that, this Japanese Company already explained that the hackers already stole the personal data of their 1.3 million customers from their Read more
Malware Hits Apple’s Macs, What About Iphones Then?
Macs hit by malware Till now the Apple’s Mac were considered to be capable of avoid all these types of malware attacks, but now it seems like the time has changed, as the company’s CEO Steve Jobs is preparing for the weeks Developers Conference, the company on the other hand was making efforts to stop Read more
Another Sony Web Site Is Under Hack
The brand of Sony has now apparently fallen for pray to yet another hacking attack with in which their personal information near about more than a lacks users of its Web Site “SonyPictures.com” has been compromised. Which is according to the opinion of a hacking group LuizSec, because they already claims that they already obtained Read more
- « Previous Page
- 1
- ...
- 12
- 13
- 14
- 15
- 16
- 17
- Next Page »