CRITICAL FLAWS IN VIDEO SURVEILLANCE

Have you ever had the feeling someone is watching you? Well, if you have an Internet-connected surveillance camera in your home or office, it’s quite possible someone is. Security researcher discovered it’s not that hard to hack a video surveillance system or more specifically the network video recorder it is attached to. Inspired by one

CONTINUE READING …

CYBER-ATTACK STRATEGY – WATERING HOLE

Cyber criminals have developed a new strategy nowadays for cyber-attack known as “watering hole”. Proving once again that they are a step ahead – and no security measure or procedure can stop them from gaining access to the information or details they want. In a watering hole attack, hackers leverage cloud services to help gain

CONTINUE READING …

BURNING OF DATA BY “FLAME” ATTACK…..

Introduction Flame, a type of computer malware attack realized in 2012, is a kind of data mining virus. It uses Microsoft Windows operating system, targeting the Middle East countries intended for cyber espionage. This attack was uncovered on MAY 28, 2012 by MAHER Center of Iranian National Computer Emergency Response Team, Kasper-sky Lab and CRYSYS

CONTINUE READING …