Cyber Security

Bluesnarfing

Bluesnarfing is the theft of information from the target device or the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, and laptops. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs) and other devices. This […]

Bluesnarfing Read More »

New AI based voice phishing attack: Warning by Israel

Israel’s foremost cyber intelligence bureau, the Israel National Cyber Directorate (INCD) has put out a warning to the world at large. Apparently, there’s a new type of cyber attack against corporates on the rise, that makes use of artificial intelligence. INCD found a new type of phishing attack which uses AI(Artificial Intelligence) based voice system.

New AI based voice phishing attack: Warning by Israel Read More »

What is logic bomb and How to safeguard against logic bomb attacks?

A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files (such as a salary database trigger), should they ever be terminated from the company. Software

What is logic bomb and How to safeguard against logic bomb attacks? Read More »