Skip to main content

Home/ educational resources/ Group items tagged hack

Rss Feed Group items tagged

tech vedic

Techvedic: Twitter's new two-factor authentication to Prevent a hack attack - 0 views

  •  
    Twitter has finally introduced two-factor authentication.
tech vedic

Make your passwords harder to crack - 0 views

  •  
    There's nothing you can do if hackers get into a database with your password in it, but you can still protect yourself for all the other worst-case scenarios involving hacking. First, don't make it easy on hackers by choosing a common password. Splashdata uses security breaches to gather 'most popular passwords' lists each year. The word 'password', number sequences, and other simplistic phrases or numbers fill the top spots. Also, don't use your name, a password related to another one you might have on a different site, or a login name. Instead, experts recommend using 15 characters, upper-case letters, better yet nonsensical words with special characters and numbers inside them. By-The Xpert Crew @ http://techvedic.com
tech vedic

KEYS TO A SECURE PASSWORD - 0 views

  •  
    Are you in a habit of using short or same passwords? Then change it now. Online world is becoming risky day by day. Hackers are always ready to hack your account and thus, it is your responsibility to protect yourself against cyber-crimes. We are providing you important tips to create strong as well as secure password.
tech vedic

Sim-card-phone-hacking-how-it-may-affect-you - 0 views

  •  
    Everyone is familiar about the term SIM (Subscriber Identification Module) which means small card slides into the back of many smartphones available in the market. Basically, it acts as an official identifier which depicts that your mobile phone belongs to you.
tech vedic

Hackers use bogus Chrome, Firefox extensions to pilfer social media accounts - 0 views

  •  
    Hacking cases are increasing day by day. There are several tricks played by hackers to steal your personal information online.
Alex Parker

Hacking Hobart: KPMG talk cyber security in wake of IS airport attack - 1 views

  •  
    In the wake of a cyber attack which forced Tasmania's Hobart International Airport to shut down after an ISIS supporter group hacked into its servers and posted defacing images, Eva Grey spoke to Matt White, senior manager in KPMG's cyber security practice, about some of the virtual dangers faced by international airports
Alex Parker

21st century battlefield: 5 experts decode the OPM data breach - 1 views

  •  
    The US Office of Personnel Management falls victim to massive data breach - but what can be learnt from this latest cyberattack? The US Office of Personnel Management has confirmed reports of a massive data breach hitting its systems, with the personal information of over 4 million government employees compromised.
Alex Parker

Mobile apps leaking data through ad networks - 1 views

  •  
    'Cross application' data sharing makes user vulnerable, says MWR InfoSecurity. Free mobile apps that use third-party advertising code are putting users in danger of being hacked, according to MWR InfoSecurity. The firm found that ad networks were inheriting the permissions of free apps, granting them access to the address books, text messages and emails of potential victims if the network was compromised by hackers.
Alex Parker

5 hacker myths you really should stop believing - 1 views

  •  
    by | 04 February 2015 Due out in a few weeks, Blackhat is a new movie looking at a case of high-level computer hacking - but how accurate is it? Lookout, your friendly neighbourhood hacker-for-good, has taken a closer look, and at first glance it's good news with the film steering clear of tired old tropes.
Alex Parker

Cyber warfare: What do state attacks look like and can anything be done to stop them? - 1 views

  •  
    Add to favorites Yahoo 's attribution of its recently revealed hack to a state actor provoked some scepticism in the technology industry. For the average IT professional, it raises some key questions: what are state cyber attacks and do they pose a threat to my business?
1 - 10 of 10
Showing 20 items per page