Category: Computer Security
Computer security, also called cybernetics, is the protection of computer systems and information from harm, theft and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment—namely, serial numbers, doors and locks and alarms. The protection of information and system access is done using other tactic, some quite complex.
Rootkit Installation – The First Three Steps
- by Team
The first step in a rootkit installation is for a computer user to have knowledge of the operating system’s operating system files. This knowledge can come from an operating system or from a rootkit installer. A computer user should know that installing rootkit software creates a false appearance that the user is running an up-to-date…
Read MoreMacquarie University Cyber Security Vulnerability
- by Team
The recent Macquarie University cyber security vulnerability was caused by an “automated system”, or a remote-controlled bot, or an automated system that was running on the same system. This automated system was developed for the National Security Agency (NSA) to use in targeted reconnaissance for espionage against foreign countries or individuals. The University is working…
Read MoreVB Live: AI Security for Enterprise Networks
- by Team
This post is part of a series on how organizations can improve security of their enterprise IT (IT) data via artificial intelligence. The topic is of broad interest for IT professionals, as are the ideas and techniques involved. The purpose of this post is to introduce you to some of the ideas and techniques involved.…
Read MoreThe First Wave of COVID-19 Cases
- by Team
The first wave of COVID-19 cases were reported just a week or two after the Novel Coronavirus outbreak. As a result, healthcare organizations were forced to begin to implement several new protective and safety measures. However, this also means that there are still two major threats that health care providers are facing: Ransomware and malware.…
Read MoreTamil Nadu IT Department on Red Alert
- by Team
The Tamil Nadu IT department has now been placed on red alert after it received a tip-off about a cyber-crime gang that was planning to hack the websites of some of the leading IT companies in the state. The cyber-crooks are allegedly planning to attack the websites of Tata Consultancy Services (TCS), ITC, Infosys, Wipro,…
Read MoreThe Hacking Techniques Used by the Russian Intelligence Agency
- by Team
The hacking techniques used by Russian intelligence agents were employed against the Democrats and media in the 2016 U. presidential election as well as the Democrats’ Congressional leadership. The hacking techniques used by the Russian intelligence agency are not only more sophisticated than those used against the U. but they are more successful. These hacking…
Read MoreThe Chinese Hacking Group
- by Team
After being released by the U. software, and have been monitoring them for some time. the Pentagon’s computer network, Pentagon. Command’s (DoICS) network. kills Chinese hacking group. intentions of the Chinese group’s recent activities. Wednesday, Aug. communities. not known, to restrict access to its citizens’ Internet content. ban to entities whose identities are not known.…
Read MoreGozi Trojan Distributors in Colombia
- by Team
The government of Colombia has arrested at least four Gozi Trojan distributors and seized their computers in several localities in the country. The computer experts arrested have been identified as Ivan Sánchez-Viejo, Guillermo Sánchez-Viejo, Jaime Sánchez-Viejo and Alberto Sánchez-Viejo. The Gozi gang is responsible for distributing computer viruses throughout the world. The Gozi group was…
Read MoreThe Issue of Gaining Access to Routers and Switches
- by Team
The issue of gaining access to routers and switches is becoming more prevalent with the proliferation of the devices. In the US, more than three-fourths of residential and small business security devices are controlled by the government. This allows the government to provide the devices to criminals without providing access to the devices themselves. Such…
Read MoreHuawei and Tencent in the Top 50 of the CCSA Security Report
- by Team
Huawei and Tencent have been named in the Top 50 of the China Communications Security Administration’s (CCSA) security report, China’s first annual ranking of Chinese ISPs. Huawei and Tencent are ranked 35th and 44th, respectively, according to the report. The two companies are also included in the top 50 of the report’s list of top…
Read MoreRecent Posts
- CyberNative.AI: The Future of AI Social Networking and Cybersecurity
- CyberNative.AI: The Future of Social Networking is Here!
- The Future of Cyber Security: A Reaction to CyberNative.AI’s Insightful Article
- Grave dancing on the cryptocurrency market. (See? I told you this would happen)
- Why You Should Buy Memecoins Right Now (Especially $BUYAI)
Recent Comments