Hacking

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

Zero-day vulnerability with file-deleting capability found in Windows 10

A security researcher unearthed a zero-day vulnerability in Microsoft Windows 10. And this one goes beyond altering system files – it actually deletes them.

Gemalto misreports 1.2 billion Aadhaar data breach; apologizes to UIDAI

Gemalto took a U-turn on its report of the Aadhaar data breach. Buckling under pressure from UIDAI, the security major has now issued an apology statement.

Attention enterprise network defenders: Burned malware returns

Burning malware forces attackers to evolve, not go away. Network defenders take note.

Kaspersky Cyberinsights 2018: Cybersecurity in the age of digital transformation

The Kaspersky Cyberinsights 2018 two city series in India, as part of its pan-APAC series, put the spotlight on the central theme of “Building Cyber Defence and Resilience with Adaptive Security Framework”. 

Quantum communication will make internet unhackable: Research

Purdue University research on quantum communication, supported by the U.S. Department of Energy can soon make internet communication hacking a thing of the past. 

Top IT security certifications

Boost your employability options with these top IT security certifications

Apple strongly denies Bloomberg’s Chinese hacking report

Bloomberg says Apple was one of many companies subject to an unprecedented state-sponsored hack, but Apple says its reporting is inaccurate.

“Everything is fine” vs. “we’re doomed” isn’t the way to frame election security

The extremes of despair and optimism are both dangerous to information security. What we need to do is calmly assess the threats.

Security experts hack unsuspecting family’s Amazon Echo

Online security experts vpnMentor have investigated the accessibility of Amazon Echo by hacking into one unsuspecting family’s device, highlighting how easily it could be tampered with.

What is Wireshark? What this essential troubleshooting tool does and how to use it

Wireshark is a must-have (and free) network protocol analyzer for any security professional or systems administrator. It's like Jaws, only for packets.

What is Magecart and was it behind the Ticketmaster and BA hacks?

The phenomenally damaging cyberattack on British Airways last week saw the haemorrhaging of information from over 385,000 transactions, credit card and personal details included.