network security
-
Alibaba and the fortified Jack Ma wall made the Chinese hackers terrified
to deal with dangerous hackers, jack ma decided to recruit all those who attacked alibaba's network to the company to work for themselves.
-
Young people are too confident when talking about online security!
when talking to many young people who are in daily contact with technology even more with relatives or friends, many of them tell me that humanity is really living at the height of public technology and information security. is this thought correct?
-
Deep Learning - new cybersecurity tool?
artificial intelligence (ai) is increasingly contributing to every area of human life. among the sub-domains of artificial intelligence in general and machine learning in particular, it can be said that deep learning is a truly outstanding technological breakthrough.
-
Endpoint Detection and Response threats, an emerging security technology
endpoint threat detection and response (etdr) is a term first introduced by security expert anton chuvakin from gartner in 2013 to refer to the tools mainly focus on detecting and investigating suspicious activities (as well as traces of other phenomena that don't always happen) on the server or
-
The alarming increase in the number of attacks targeted at IoT devices
along with the explosive growth of globalized internet and especially wireless connectivity, the number of attacks targeted internet devices and things (iot) has escalated 'scary. 'throughout 2018.
-
There were 12,449 serious data breaches recorded in 2018, an increase of 424% compared to 2017
a recent statistical report showed alarming facts. specifically, the number of confirmed data violations in 2018 has reached 12,449 cases, an increase of 424% compared to 2017.
-
Ransomware STOP started installing Trojans to steal victim passwords
in addition to encrypting files on the system, ransomware stop strains have also started quietly installing the azorult password stealing trojan on the victim's computer to steal account information, electronic wallet, and file desktop ...
-
Application protection against DFA attacks
differential fault analysis, also known as dfa, is an attack technique designed to recover cryptographic keys from the application ...
-
Ransomware LockerGoga is making a big corporation miserable
norsk hydro - one of the world's largest aluminum and renewable energy corporations based in oslo, norway, was forced to suspend most of its production lines and switch to manual operation. part of a network attack is said to be related to lockergoga malicious code.
-
What is cybercrime? How to prevent cybercrime?
we live in an era of internet globalization. the internet invades every corner of the street, is present in every living room and appears in every breath of life. in addition to the obvious benefits, as well as the enormous positive role in the overall development of all humanity, the global
-
DDoS is ranked as the top threat for businesses in 2018
ddos attacks are considered to be the top high threats for global organizations and businesses.
-
Supercomputers can completely detect cyber threats
as governments, businesses and individual users increasingly trust and use the internet for their daily activities, maintaining cybersecurity will still be an essential task for researchers. as well as security experts worldwide.