mcrblg-header-image

search

Category: Uncategorized


“SPACE FORCE” is new space war domain…ARE WE REVISITING 80s Again

Posted by in Uncategorized

Race for star wars in new package…again US President Donald Trump announced a sweeping new space policy on Monday that will focus both on reducing satellite clutter in space as well as creating a specific “Space Force” as the newest branch of the military. “It is not enough to merely have an American presence in…


Artificial Intelligence (AI) Vs Human Intelligence (HI)

Posted by in Uncategorized

Whats the AI? The Artificial Intelligence can be defined as From Wikipedia In computer science, AI research is defined as the study of “intelligent agents”: any device that perceives its environment and takes actions that maximize its chance of successfully achieving its goals. Colloquially, the term “artificial intelligence” is applied when a machine mimics “cognitive”…


Human factor: Weakest Link! But Strongest Element in Implementation In Cyber Security

Posted by in Uncategorized

Human Factor is strongest as well as weakest link in implementation of Security


This Computer Cluster Cracks Every Windows Password in 5.5-hours or Less

Posted by in Uncategorized

The Virtual OpenCL cluster platform works along with ocl-Hashcat Plus- a free password-cracking tool. The cluster isn’t limited to brute force attacks and it deploys other techniques like dictionary attacks to crack every possible password combination.


10 Free Linux eBooks, Learn and polish your Linux skills.

Posted by in Uncategorized

“If you’re planning to take your Linux learning process to more admin/expert level, then we’ve compiled a list of 10 Free Linux eBooks that will help you to build your Linux skills foundation very strong.”


Neurevt bot Malware Analysis | BlueKaizen

Posted by in Uncategorized

Upon installation, the  Neurevt bot injects itself into almost all user processes to take over the whole system. Moreover, it utilizes a mechanism that makes use of Windows messages and the registry to coordinate those injected codes. The bot communicates with its C&C server through HTTP requests. Different parts of the communication data are encrypted (mostly with RC4). Many components cover a large number of the most popular malicious functionalities, including downloading malware, DDoS attacks, and credentials stealing.


Network Shared Drive Encrypted by CryptoWall?Track Down the Infected PC – Palo Alto

Posted by in Cyber Defense, Uncategorized

Tandem Cybersecurity Assessment Tool wins Innovative Solutions Award 2015

Posted by in Uncategorized

The tandem Cybersecurity Assessment tool, launched in July 2015, was developed to help financial institutions such as banks and credit unions complete the FFIEC cybersecurity self-assessment released on June 30th


Japan fights its own corporate pride, opaqueness in push to improve cybersecurity

Posted by in Uncategorized

By GERRY SHIH, Associated Press OKINAWA, Japan (AP) — Apart from rogue hackers, criminal organizations or even state-backed cyberwarfare units, Japan’s businesses and government agencies are facing a unique cybersecurity foe: themselves. Even with the frequency and severity of cyberattacks increasing rapidly worldwide, efforts by the world’s third-largest economy to improve its data security are…


close

Hi, guest!

settings

menu