Cyber Attacks

Automated US Power grids to be replaced by manual systems to limit Cyber Attacks

All these days we all were proud of automation and the bouquet of benefits it brings to mankind. But hereā€™s a news piece which might brush up your minds with a new notion. The US Senate has decided to replace the automated power grid control systems with manual ones in order to limit repercussions raised […]

Over 5 million Cyber Attacks on IP Cameras in just 5 months

Japan-based Cybersecurity firm ā€˜Trend Microā€™ has revealed that it has blocked over 5 million cyber attacks on IP Cameras in just 5 months, highlighting the security risks luring on IP based surveillance devices. The security firm which is headquartered in Tokyo is said to have come to the above conclusion after analyzing highly sophisticated attacks […]

A gist on Polymorphic Phishing Cyber Attacks

Polymorphic Phishing Cyber Attack is a kind of email phishing attack where malevolent emails are sent to multiple users with slight changes being made to the email such as modifying sender name, sender address, subject greeting, email body or signature. Ironscales, an Israel based Cybersecurity firm which was working on introducing an anti-phishing platform discovered […]

Over 12 billion cyber attacks witnessed in the gaming industry since 2017

Akamai Technologies, a cloud services provider from Massachusetts says that since early 2018 the gaming industry has witnessed over 12 billion cyberattacks- mainly related to credential stuffing. According to the 2019 State of the Internet/Security Web Attacks and Gaming Abuse report of Akamai, the gaming industry has become a software target to hackers as they […]

China to strongly retaliate US Cyber Attacks

A report published on Monday by Chinaā€™s National Computer Network Emergency Response Technical Team (CNCERT) says that a major portion of cyber attacks which took place in 2018 on Chinese Networks came from the borders of United States. The report also includes a warning which says that China is prepared to launch retaliated cyber attacks […]

Britain to ā€˜Kitemarkā€™ electronic devices in the wake of Cyber Attacks

Government of Britain has decided to introduce a new ā€˜Kitemarkā€™ system for electronic devices and websites as the populace of the United Kingdom are becoming super- vulnerable to cyber attacks. As it is getting a lot more difficult for consumers to know whether the Internet of Things enabled devices or online website are safely holding […]

Russia receives a stern warning from NATO for Cyber Attacks

Russia which faced sharp criticism for launching cyberattacks on western nations till date has now received a stern warning from NATO. The North Atlantic Treaty Organization says that it will be ready to use all means at its disposal to react to cyber attacks and the warning goes to all adversaries of the UK including […]

European Union to push sanctions on Russia and North Korea for Cyber Attacks

All those countries launching cyber attacks on the critical infrastructure of public and private companies operating in European Union (EU) will have to brace for harsh punishments including the freezing of assets, travel bans on individuals and from nations, firms and state bodies. Thatā€™s because from now on the EU has adopted powers to punish […]

Technology used in Fitness Trackers can help thwart Cyber Attacks

A team of researchers from the University of Bath and Goldsmith in association with the University of London has discovered that the technology used in Fitness Trackers can help thwart cyberattacks if engaged smartly. Researchers say that a device developed by them using the tech behind the fitness trackers can signal changes made to passwords, […]

Verizon survey confirms C-Suite employees are vulnerable to Cyber Attacks

A recent survey conducted by Verizon says that senior-level executives i.e C-Suite employees are 12 times more vulnerable to cyber attacks and 9 times more to data breaches. Verizon 2019 Data Breach Investigation Report says that C-level employees are more prone to social engineering attacks as they hold the most sensitive information. For the first […]

Share this page