Home Technology - Hacking

Technology - Hacking

Technology news and blogs

Google Online Security Blog: How Google adopted BeyondCorp: Part 3 (tiered access)

This is the third post in a series of four, in which we set out to revisit various BeyondCorp topics and share lessons that were learnt along the internal implementation...

CryptoCurrency Breaches and Hacking Scandals: How to Address them?

The proponents of cryptocurrency always harp on the point that it is very safe and secure and the blockchain technology that is used is virtually hacking proof. Let’s face it,...

Wireshark 3.0.5 Released with the fix for Several Vulnerabilities

Wireshark 3.0.5 has been released with the new Qt version and fix for other vulnerabilities. The Qt is the library used in Wireshark to build the UI. The Wireshark is the...

15,000 private webcams exposed to creeps

Your exposed webcams are backdoor for creeps.Every cybersecurity article you’ll find will include some sort of reminder emphasizing the use of strong passwords, good antivirus software and the related usual....

Android Q is 10 – What to Expect

Android 10 formerly known as Android Q is officially available for use. More than a year of development and testing Android 10 has been released with promising features nobody wants...

How does 5G network slicing work, and what are the benefits?

Among its other capabilities, the 5G network supports slicing, a technique that divides a single physical network infrastructure into multiple virtual networks. Compared to existing 4G and LTE (Long Term...

Cybercriminals Attack at a Powerful Chinese Financial Company

Reading Time: 2 minutes  Incidents of user data theft skyrockets...

How Virtual Reality Can be the Future of Education

One of the major problems that students battle with is understanding very abstract parts of their studies. The traditional method of learning, which has been used for many years, is fast going out...

Threat landscape for smart buildings

The Kaspersky Industrial Cybersecurity Conference 2019 takes place this week in Sochi, the seventh such conference dedicated to the problems of industrial cybersecurity. Among other things, the conference will address...

APLICATIONS

Exclusive White Paper: Data Privacy in 2020

Even though we are currently in the throws of summer, 2020 is right around the corner, and the implications are immense. In the U.S.,...

HOT NEWS