The term “doxware” is coined from the term ‘dox’, meaning searching or posting private information online with any malicious intention. The criminals draw the victims’ attention by stating that their crucial, confidential or personal... Read more
Google recently announced that they have successfully generated a collision for SHA-1, although it would 90 more days before they reveal to the world as to how they accomplished this task. Hashing functions are an important aspect of cryptograph... Read more
A group of sophisticated hackers have targeted Android phones of Israeli Defense personnel by developing a malware named ViperRAT that has spying functions exposing the vital and sensitive whereabouts of the soldiers to the sly enemies. This mal... Read more
With the wave of digitization, there is drastic increase in the usage of mobile internet. The fraudulent financial transactions are rising at par too. (Approximately $20 billion I.e. Rs 1.26 lakh crore as per a report from Assocham) Financial fr... Read more
We have already experienced the havoc created by Mirai Botnet, which infected Internet facing IoT devices and initiated one of the largest DDOS attacks ever recorded. We have embraced IoT due to the sheer fact that it has enabled us to control t... Read more