Data Security: Service and Tool

services, tools, resources, and stories: it's an imformation hub of data security to help keep your data secure.

Custom Search
 Search Services
Key Words
Country/Area
City



 Search Tools
Hot Words
Key Words
Category
OS/Device



 Hot StoriesMore ... 

FORESHADOW ATTACK AFFECTS INTEL CHIPS

By Dave Lee
This is third time this year Intel chips are discovered security flaw, code as Foreshadow. Researchers from at least 3 organisations reported a crucial risk that was proved by Intel quickly. To avoid possible attack, Intel did a hot fix to key consumers, like the biggest cloud services companies - Amazon, Google and Microsoft. Personal users are advised to download and install any software updates available...
By Dave Lee  View Source  
Related stories:   SECURITY FLAW   INTEL   FORESHADOW   
You Know Who’s Cyber Hacking Getting Ugly
This was a report of 5 years ago. Today we even cannot list its original title. It's not a concern of copyright, instead, it will add risk to be targeted as victim of cyber attack. In fact, the report is quit fair, not just point a finger to particular country or countries. It shows that America is not an innocent in the world of cyber-spying. It hints the real threat is most of victims give up fighting with dark forces so that cyber hacking is a low risk and high profit industry. 5 years passed, thing is even worse, we have to use "you know who" ...
By The Economist  View Source  
Destructive Ransomware Has Made Crooks 6M
This destructive ransomware, called as SamSam, has made crooks $6m by encrypting data. The attackers who run the ransomware show no signs of giving up. These guys are taking $300,000 a month in ransom from victims, the total is more than 6 millions since late 2015. The malware encrypts your files for ransom similar as other ransomware to make profit. The difference is while other variants are spammed out to potential victims by email, SamSam attacks are thought to begin with a remote desktop protocol...
By Danny Palmer  View Source  
2018 Data Breach Investigations Report
In reality, nearly 81% of data breaches are facilitated by weak, reused or stolen passwords. When we talk about data secure, the key point should be how to make a strong password and how to keep it safe. This report uncover some new investigation 2018. If you once doubted the importance of password, the key role of data secure. The report may be deserved to have a look. If you leave a password on a sticky note, it gives attackers the chance to take keys and it’s an entirely avoidable risk with devastating cost.
By Verizon Enterprise  View Source  
Did You Update Twitter Password That May Be Leaked
Twitter masks passwords through a process called hashing using a function known as bcrypt, which replaces the actual password with a random set of numbers and letters that are stored in Twitter’s system. Due to a bug, passwords were written to an internal log before completing the hashing process. Twitter itself found this error, removed the passwords & are implementing plans to prevent this bug from happening again. In the meantime, Twitter is asking 300+ Million users to change their passwords. Did you do it?
By Chaim Gartenberg  View Source