Archives for cyber security - Page 4
As the world worries about the attacks like ransomware and DDoS, there are other attacks that are gaining a lot of traction amongst the threat actors. And one such attack that has lately started to make sense is “Paraphrasing Attack”. What’s A Paraphrasing Attack? Currently, a significant number of companies are relying on artificial intelligence…
The post Paraphrasing Attacks: It’s Time To Take Another Look At AI Algorithms For Text-Based Content appeared first on Analytics India Magazine.
From January 2020, Python 2.x branch will no longer be supported by its creators and will see no new major releases, bug fixes, or security updates. It seemed like the developer community had a lot of time when Guido van Rossum in 2014 made the announcement. But finally, it is becoming a reality and the…
The post As Python 2’s Demise Approaches, Developers Contemplate Porting Code To Python 3 appeared first on Analytics India Magazine.
Mass surveillance has long been a serious issue worldwide. In 2013, American whistle-blower, Edward Snowden copied and leaked some of the highly confidential information from the National Security Agency (NSA). The reports were leaked on several media outlets and this incident raised numerous questions against the practice of mass surveillance by world governments, triggering a…
The post Google, Apple & Mozilla End Kazakhstan’s Attempts To Spy On Its Population By Blocking The Root Certificate appeared first on Analytics India Magazine.
First time since 2013 we have witnessed a decrease in ransomware activity, with the overall number of ransomware infections on endpoints dropping by 20%. However, ransomware like WannaCry, copycat versions, and Petya, continued to inflate infection figures. But when these worms are stripped out from the statistics, the drop in infection numbers is steeper: a…
The post What If Artificial Intelligence Becomes Ransomware’s Sidekick? appeared first on Analytics India Magazine.
Cybersecurity has always been one of the most complicated and sensitive domains. As attackers continue to become more inventive every year, new kinds of attacks emerge and make companies across the world realise that hackers are one step ahead. In this article, we are going to look at one of the sophisticated attacks that is…
The post BGP Hijacking Is Gaining Traction & There’s Only So Much You Can Do To Fight It appeared first on Analytics India Magazine.
There was a time when the world was witnessing some of the most notorious cyber-attacks — from DDoS to Polymorphic Phishing to Social Engineering. However, with time as organisations have started strengthening their cybersecurity game, black hat hackers have also started to implement some of the most sophisticated strategies to own organisations. And one such…
The post With Ransomware Attacks On A Rise, These Industries Have Become The Top Targets appeared first on Analytics India Magazine.
Over the past few years, the number of cybersecurity attacks have increased significantly. Today, every single aspect of a business is under attack by hackers. As the world continues to become more digital with new mobile apps and other platforms, the risk of getting pwned is also increasing. While companies are taking every possible step…
The post In A Major Security Push, Tech Giants Go Big On Bug Bounty Programs appeared first on Analytics India Magazine.
The rate of cyberattacks has been on the rise for the last two years. In 2018, about two million cyberattacks happened and it cost over $45 billion in losses worldwide, according to a source. India ranks 3rd among nations that are most prone to cyberattacks. In 2018, 76 per cent of Indian businesses were hit…
The post How To Start A Career In The Cyber Forensics Domain appeared first on Analytics India Magazine.
Over the years, cybersecurity threats have created massive catastrophes not only for organisations but also for individuals. No environment is immune to cyberattacks as hackers continue to develop new tools and techniques, targeting corporate assets stored on cloud infrastructure, individuals’ mobile devices, trusted third-party supplier apps and even popular email platforms. According to a report…
The post What Is A Destructive Malware Attack & How Your Organisation Can Combat It appeared first on Analytics India Magazine.
Companies across the world have shifted their focus from old-school cyber threats to all the advanced security breaches. However, things have changed in this sector — black hats have started to make the best use of old hacking methods by tweaking them a little. One such attack is Logic Bomb. What Is A Logic Bomb…
The post How To Keep Your Organisation Safe From Logic Bombs appeared first on Analytics India Magazine.