Posts From Shah Sheikh

Every day, almost one million malware threats are introduced in the ceaseless jungle that is the internet. And yet, software developers, security experts, and IT administrators are expected to stay up-to-date with these latest threats to ensure that network environments

The IT peripherals-to-mobile phones company Intex Technologies is now using robot-assisted technology for almost everything at its manufacturing unit in Noida with an aim to provide best products to its customers, a top executive of the domestic company said here. “First we

Microsoft and the U.S. government are in an ongoing battle over an Irishman allegedly involved in Silk Road wanted by the FBI on darknet drug charges, as reported by Deep Dot Web. The 27-year-old Irishman, Gary Davis, from Wicklow, is

It is no secret that hostile cyber actors are targeting every organization and institution in the public and private sectors, and the government is no exception. These disruptive activities have plagued the government for several years uncovering security deficiencies that

An attack on The Bank of Bangladesh, according to BAE Systems, was carried out using malware that targeted SWIFT’s Access Alliance software and changed code to alter a database recording the bank’s activity. However, the findings did not reveal how

Avid Life Media (ALM), the parent company of hacked adultery website Ashley Madison, is facing a US Federal Trade Commission (FTC) probe over its use of automated software called ‘fembots’ on its websites, which impersonated real women to lure in

Fraudsters are increasingly using social media sites such as Facebook, Twitter and LinkedIn as a “hunting ground” for personal information, leading to huge rise in identity theft, according to a new report. The number of victims of identity theft rose by

There have been significant developments in the biometric industry over the past decade – leading to systems that are an order of magnitude faster, smaller and cheaper than before. Accuracy improvements, including the layering of biometrics, help keep the bad