Race to outrace Moore’s Law : Smallest computer unveiled by IBM

Race to outrace Moore's Law : Smallest computer unveiled by IBM
Boon for Industry, Researchers and Cryptographers At the annual technical conference on 19 March 2018, Think 2018, IBM unveiled the smallest computer  as on date, which is about one square mm in size.This is still in research stage and dates for its availability are yet to be disclosed. As per the IBM sources “Within the ...

Era of New Technologies : BITCOIN, BLOCK CHAIN, AI, IOT, QUANTUM COMPUTING

Blockchain   New era of information technology has arrived. Is presence can felt on the cyber domain. In last one decade, the new technologies and their advancement has defied all logic. It’s been a great twentieth century, wherein we got engrossed in Bitcoins, and underlying technology of Blockchain. Then AI got our attention…. as Google has ...

Wallstreet hacked.. One year back.. As it ignored internal advice.

_*Wall Street’s watchdog fails to follow its own counsel on disclosing cyberattacks*_ * “Edgar is the equivalent of Fort Knox for sensitive corporate filings before they are released publicly. It is a gold vault for insider traders,”  * The system that was breached, known as Edgar, serves as a clearinghouse for the public filings that ...

Ransomware Twister… Show me your birth suited Pic

New demand of ransomware.. *Send me ten naked pics of your.. We will verify and then unlock files.* strange twist in tale of ransomware.. Read more about this interesting news, the victim is also asked to create a ProtonMail account.. https://goo.gl/ogWjcP Like 0

Human factor: Weakest Link! But Strongest Element in Implementation In Cyber Security

Human factor: Weakest Link! It has been always been a strong point of debate  whenever it is discussed for implementation of Cyber Security..  Who is the Weakest Link? Identification has never been difficult for Security team and they  have be univocally supported by both, Executives and /management…THE USER. The User.. is known by many other ...

Here’s the Best Antivirus Software for Windows 7, 8.1, and 10 PCs

Reputed antivirus testing house AV-Test has released the latest results of the best antivirus software for Windows. AV-Test is one of the leading antivirus testing firms and it has released its antivirus ratings for the Windows 7, Windows 8.1 and Windows 10 PCs. The test has assessed about 27 anti-malware software suits on the basis of ...

US voter database leak was discovered by Chris Vickery, a white hat hacker.

Millions of US voter accounts exposed with sensitive data. Researcher Chris Vickery, uncovered this database which was left open for everyone to access. In his conversation with Forbes, he says he got access to almost 300GB of voter data including names, home addresses, phone numbers, dates of birth, party affiliations, and logs of whether or ...

This Computer Cluster Cracks Every Windows Password in 5.5-hours or Less

A password-cracking expert has created a new computer cluster that cycles about 350 billion guesses per second to crack any Windows PC password. This beast was created using: Five 4U servers 25 AMD Radeon GPUs 10x HD 7970 4x HD 5970 (dual GPU) 3x HD 6990 (dual GPU) 1x HD 5870 4x SDR Infiniband interconnect ...

10 Free Linux eBooks, Learn and polish your Linux skills.

We’ve compiled a list of 10 Free Linux eBooks that will help you to build your Linux skills foundation very strong. I have and still am struggling many a times with linux commands and what these commands do… Some of the books here appear to be old and outdated but they are still relevant, therefore ...

Neurevt bot Malware Analysis | BlueKaizen

IntroductionNeurevt bot “Beta Bot” has a lot of functionalities along with an extendable and flexible infrastructure. Upon installation, the bot injects itself into almost all user processes to take over the whole system. Moreover, it utilizes a mechanism that makes use of Windows messages and the registry to coordinate those injected codes. The bot communicates with its C&C server through ...
Hosted By Arvixe