Category: Computer Security

Computer security, also called cybernetics, is the protection of computer systems and information from harm, theft and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment—namely, serial numbers, doors and locks and alarms. The protection of information and system access is done using other tactic, some quite complex.

Rootkit Installation – The First Three Steps

The first step in a rootkit installation is for a computer user to have knowledge of the operating system’s operating system files. This knowledge can come from an operating system or from a rootkit installer. A computer user should know that installing rootkit software creates a false appearance that the user is running an up-to-date…

Read More

Macquarie University Cyber Security Vulnerability

The recent Macquarie University cyber security vulnerability was caused by an “automated system”, or a remote-controlled bot, or an automated system that was running on the same system. This automated system was developed for the National Security Agency (NSA) to use in targeted reconnaissance for espionage against foreign countries or individuals. The University is working…

Read More

VB Live: AI Security for Enterprise Networks

This post is part of a series on how organizations can improve security of their enterprise IT (IT) data via artificial intelligence. The topic is of broad interest for IT professionals, as are the ideas and techniques involved. The purpose of this post is to introduce you to some of the ideas and techniques involved.…

Read More

The First Wave of COVID-19 Cases

The first wave of COVID-19 cases were reported just a week or two after the Novel Coronavirus outbreak. As a result, healthcare organizations were forced to begin to implement several new protective and safety measures. However, this also means that there are still two major threats that health care providers are facing: Ransomware and malware.…

Read More

Tamil Nadu IT Department on Red Alert

The Tamil Nadu IT department has now been placed on red alert after it received a tip-off about a cyber-crime gang that was planning to hack the websites of some of the leading IT companies in the state. The cyber-crooks are allegedly planning to attack the websites of Tata Consultancy Services (TCS), ITC, Infosys, Wipro,…

Read More

The Hacking Techniques Used by the Russian Intelligence Agency

The hacking techniques used by Russian intelligence agents were employed against the Democrats and media in the 2016 U. presidential election as well as the Democrats’ Congressional leadership. The hacking techniques used by the Russian intelligence agency are not only more sophisticated than those used against the U. but they are more successful. These hacking…

Read More

The Chinese Hacking Group

After being released by the U. software, and have been monitoring them for some time. the Pentagon’s computer network, Pentagon. Command’s (DoICS) network. kills Chinese hacking group. intentions of the Chinese group’s recent activities. Wednesday, Aug. communities. not known, to restrict access to its citizens’ Internet content. ban to entities whose identities are not known.…

Read More

Gozi Trojan Distributors in Colombia

The government of Colombia has arrested at least four Gozi Trojan distributors and seized their computers in several localities in the country. The computer experts arrested have been identified as Ivan Sánchez-Viejo, Guillermo Sánchez-Viejo, Jaime Sánchez-Viejo and Alberto Sánchez-Viejo. The Gozi gang is responsible for distributing computer viruses throughout the world. The Gozi group was…

Read More

The Issue of Gaining Access to Routers and Switches

The issue of gaining access to routers and switches is becoming more prevalent with the proliferation of the devices. In the US, more than three-fourths of residential and small business security devices are controlled by the government. This allows the government to provide the devices to criminals without providing access to the devices themselves. Such…

Read More

Huawei and Tencent in the Top 50 of the CCSA Security Report

Huawei and Tencent have been named in the Top 50 of the China Communications Security Administration’s (CCSA) security report, China’s first annual ranking of Chinese ISPs. Huawei and Tencent are ranked 35th and 44th, respectively, according to the report. The two companies are also included in the top 50 of the report’s list of top…

Read More