IT News

Expert: Terrorists using Facebook as recruitment tool

SYDNEY: Terror outfits are using social networking giant Facebook to recruit loners from Western nations like Australia to their cause, a leading counter-terrorism expert has claimed. 

Bill Paterson, the Australian Ambassador for Counter Terrorism, said that terrorists have embraced the rise of technology, the internet in particular, to spread their messages and attract followers. 

"Established terrorist cells have found social media to be a useful communication tool - Facebook, Twitter, that sort of thing," News.com.au quoted Paterson, as saying. 

Twitter Admits that “We are Tracing user Activities”

LONDON: Micro blogging website Twitter has revealed that it tracks its users' movements across the internet in order to suggest relevant content to tweeters. 

The company made the disclosure in an email sent to its users about changes to its service and privacy policy. 

"We've provided more details [in our new privacy policy] about the information we collect and how we use it to deliver our services and to improve Twitter," the email read. 

Microsoft asked Google to remove 500,000 links

WASHINGTON: Software giant Microsoft requested Google to remove over 500,000 links from its search index in April, new figures published by the search giant have revealed.
Google's data showed that most of these links would direct users to websites that sell pirated Microsoft software.
Some of the links, which Microsoft asked Google to remove are, however, still live via its own search engine Bing, The Telegraph reports.

Find System Vulnerabilities before Someone else does

Now a days where Hacking attempts are rising with the an increased speed, the security breaches are more and it is just because of the security loopholes which are available in our system. It is very important for each computer user to check the system vulnerabilities to make sure that the computer is secure enough from the external attacks.

To check the system vulnerability, it is important to block the open ports through which the malicious content effect a machine. So let us understand what are different types of ports and how to scan them from security point of view.

Recent Hacking Attempt on RBI website

MUMBAI: The Reserve Bank today said there was an attempt to hack its website on Thursday, rendering it inaccessible for almost the entire day.
"It was a DNS (Domain Name System) attack where the hacker tried entering the website from a single Internet protocol address multiple times, jamming its bandwidth," an RBI spokesperson said.
Due to multiple requests received from the hacker's IP address, genuine entrants were unable to access the RBI website--www.rbi.org.in.

Cloud Computing And Cyber Forensics

If a considerable proportion of your business operations are conducted via computer, it is likely that you use a range of software, such as a word processor, email client, accounting package and client relationship management tool.