Archives for hacker

20 Feb

Why Malicious Hackers Love To Make A Cryptocurrency Called Monero

The main feature of Monero called Ring Signatures used in the network’s CryptoNote protocol mixes the spender’s input with a group of others. This makes it extremely difficult to create a connection between each subsequent transaction data.  In the last few years, the ransomware boom seemed to have slowed down. Over the past 24 months,…

The post Why Malicious Hackers Love To Make A Cryptocurrency Called Monero appeared first on Analytics India Magazine.

20 Feb

Why Malicious Hackers Love To Make A Cryptocurrency Called Monero

The main feature of Monero called Ring Signatures used in the network’s CryptoNote protocol mixes the spender’s input with a group of others. This makes it extremely difficult to create a connection between each subsequent transaction data.  In the last few years, the ransomware boom seemed to have slowed down. Over the past 24 months,…

The post Why Malicious Hackers Love To Make A Cryptocurrency Called Monero appeared first on Analytics India Magazine.

11 Dec

Top AI-Based Attacks That Shocked the World In 2019

Artificial Intelligence is still learning and getting stronger each day. But the pros and cons for the technology have always been in the limelight. From its use for data breaches to deepfakes, 2019 has shown us that AI is here to stay, but not without putting a price on our comfort. 2019, like the previous…

The post Top AI-Based Attacks That Shocked the World In 2019 appeared first on Analytics India Magazine.

12 Jul

The Thin Ideological Line That Separates White Hat Hackers & Black Hat Hackers

image-5746
image-5746

Most of the times, the word ‘hacker’ is labelled with a negative connotation. Movies and TV shows have cemented the image of a hacker as a person with glasses typing away at a screen with green text. However, the world of hacking has much more to it than what we see in mainstream pop culture.…

The post The Thin Ideological Line That Separates White Hat Hackers & Black Hat Hackers appeared first on Analytics India Magazine.

19 Jun

Cyber Threats Are Getting Personal For CXOs — The Next High Value Target

image-5220
image-5220

We live in a world that has become extensively digital, and the amount of data getting generated every single day by companies, organisations, governments, is also skyrocketing, posing significant hacking risks. If you look at it from a hacker’s point of view, an executive is definitely the HVT (high-value target) to hunt as they most…

The post Cyber Threats Are Getting Personal For CXOs — The Next High Value Target appeared first on Analytics India Magazine.

19 Jun

Cyber Threats Are Getting Personal For CXOs — The Next High Value Target

image-5221
image-5221

We live in a world that has become extensively digital, and the amount of data getting generated every single day by companies, organisations, governments, is also skyrocketing, posing significant hacking risks. If you look at it from a hacker’s point of view, an executive is definitely the HVT (high-value target) to hunt as they most…

The post Cyber Threats Are Getting Personal For CXOs — The Next High Value Target appeared first on Analytics India Magazine.

22 May

4 Programming Languages Every Cyber Security Professional Must Know

image-4692
image-4692

Technology is playing a significant role in our day to day life, and with that, the world is becoming extensively connected —whether it’s about talking to a closed ones living overseas or it’s about asking your AI assistant to turn off the lights of your bedroom. However, there lie a somethings that we should be…

The post 4 Programming Languages Every Cyber Security Professional Must Know appeared first on Analytics India Magazine.

07 Mar

5 Indian Bug Bounty Programs Every White Hat Hacker Can Try

image-3106
image-3106

Whether you talk about building software or finding vulnerabilities in an existing platform, Indians over the years have marked their territory in the technology space and now hacking as a hobby has gained prominence with India having the highest base of white hat hackers. According to a recent report,  bug hunting has proven to be…

The post 5 Indian Bug Bounty Programs Every White Hat Hacker Can Try appeared first on Analytics India Magazine.

25 Sep

Data Science Hacks No One Talks About But Are A Must In Your Toolkit

image-282
image-282

With the data revolution in full swing, there is more information on the internet than a human can remember and process in his/her lifetime. Data Science is a demanding platform, where every forward looking enterprise and startup wants to increase their productivity with the help of intelligent systems. It is an interdisciplinary platform that involves […]

The post Data Science Hacks No One Talks About But Are A Must In Your Toolkit appeared first on Analytics India Magazine.