Posts

Showing posts from November, 2016

Top seven data breaches of 2016

 Hi all again, In this blog I am going to tell you about "Top 7 Data Breaches of 2016" . First of all what is "Data Breach".   "A Data Breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment. Other terms for this phenomenon include unintentional  information disclosure, data leak and also data spill." So now here are the "Top 7 Data Breaches of 2016" . · Fling.com- The adult dating website was hit by a identity theft breach by a malicious outsider. This incident took place on 6th May 2016. In which about 40 Million Records were exposed. Tens of millions of credentials stolen from the site were put on the sale on the dark web, according to International Business Times. The information supportedly included email addresses, plain text passwords, usernames, IP addresses and date of birth records. · 17 Media- The software company's photo sharing and video steaming...

Hackers tactics.

Image
Hi folks welcome once again, In my last blog I shared the information about terminologies used in hacking. In this blog I am going to tell you about the 10 tactics of the hackers which they use to fool you or you as a hacker can do. So right now I am going to tell you about 10 tactics which are commonly used by the "HACKERS" to fool you. 1. Keylogger: It is a type of surveillance spyware for the hackers. Hackers use this technique to steal data and important login credentials from the victim without his/her information. The hackers steal the type of data are social website login passwords, bank account passwords, etc. The hacker receives all the keystrokes of the victim through email. 2. DDOS attack: A Distributed Denial Of Service(DDOS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. Those attacks often employ botnets also called zombie computes, which are systems that are taken over, some...