Tags » Data Theft

Jigsaw and how ransomware is becoming more aggressive with new capabilities

There is no doubt that criminals have found a mechanism in ransomware enabling them to obtain significant benefits with relatively little effort. And the information stored by computers is much more important than we think, although many users only realize this when they lose access. 738 more words

Security News


Medical sector must immediately address the issue of a newly trending cyber espionage for which they are at the receiving end. Cyber Hackers are having a field day in the black Markets of Dark web, where medical data is worth 10 times more than a stolen credit card number according to a Reuters report. 243 more words


Public Service Announcement from IMS: Unauthorized Access

Evidence suggests “lpozner@gmail.com” gained access to Independent Media Solidarity’s Google Drive. But how?

IMS (Independent Media Solidarity), the independent collective of citizen journalists was recently the victim of theft. 2,551 more words

Guest Posts

Just because you're paranoid doesn't mean they're not after you

I’ve just watched Gary Wolf’s TED talk The Quantified Self and Katina Michael discussing Big Data and the Dangers of Over-Quantifying Oneself and am leaning towards the risk-averse take on the quantified self. 667 more words


Cigniti Ensures a Secure Online Existence

“You’re in Hackerville here on the Internet. Period. … All of this stuff lacks formal discipline.” ~ Randy Bush, a computer scientist who specializes in routing security. 298 more words

Identity theft accounts for ‘majority of data breaches’

Theft of identities along with personal information still accounts for the majority of data breaches, a new global survey by Gemalto has found.

According to the 2015… 277 more words

Security News

Understanding the Mobile App Permissions (Contd.)

In continuation to my previous post “Understanding the Mobile App Permissions“, let’s have a look at some other App permissions.

View Network State… 896 more words