Hiring a Hacker in your IT team is really secure or not?

Hackers might have shaded pasts, but if hired can bring a lot of IT security expertise in the system. Should you consider hiring one?
In this Open Source Era where everything is easily available online, Internet has given various pros and cons to the IT world. Still company’s think that Hackers are the curse of the Cyber Security professional's existence when they goes unethical, but the truth is, hackers often understand the distinctions of Cyber Security better than an average CTO. So is it really secure to hire a Hacker in your IT team?

Germany equipped itself for Cyber wars

With increase in major security attacks, cyber security has become one of the most concerned issues globally. To cope with such global issue Germany has prepared a special cyber warfare unit of its military to conduct offensive operations against computer hackers, who attack key installations or engage in espionage activities.
After more than six years of preparations, the special unit of IT specialists in uniform is now in a position to ward off hacker attacks and to mount counter attacks, media reports here said quoting ministry officials. 

An in-depth analysis of Flame C&C’s structure by Kaspersky Lab experts

A malicious virus named Flame was discovered and announced by Kaspersky Lab on 28 may 2012, which was actively being used as a cyber weapon targeting entities in several countries. Kaspersky Lab’s experts discovered the virus during an investigation prompted by the International Telecommunication Union (ITU), and the analysis of the malicious program revealed it was the largest and most complex attack toolkit to date.

Google now ready to try its hands in Customer Service Business

Google Inc is now getting all set to get into customer service business as the world’s most preferred search engine company is gearing up to compete competition with e-commerce giant Amazon.com Inc. Google commenced a new certification service called Google Trusted Stores that helps shoppers see which online merchants ship quickly and reliably and which ones offer great customer service.
 
Google has been testing the free service with online retailers including Wayfair, Timbuk2 and Beau-coup. It is open to all U.S. merchants starting on Thursday.
 

Apple vs. Google: Gaining heat in summers

Apple's World Wide Developer Conference (WWDC) unveiled iOS 6 for the iPhone and iPad. Apple is promising over 200 new features in the latest version of its mobile operating system, but only a few of them were highlighted in the keynote.
June is an exciting month for smartphone fanatics as Microsoft is expected to unveil the next generation of Windows Phone at an event on June 20 while Google is expected to reveal its plans for the next version of Android, codenamed "Jellybean."
Here are a few specs to see who comes out on top
Apple iOS 6 vs. Android 4.0: User interface

Alarming cyber crimes are boosting security demand

Expressing grave concern about the growing threat of cyber terrorism in his opening statement at the meeting of Chief Ministers on National Counter Terrorism Centre (NCTC) held on May 5, 2012, Union Home Minister P. Chidambaram stated:

Hacker arrested for Hacking into Six Million Computers.

Police have detained a 22-year-old hacker who created a system of networked computers that was used to steal more than 150 million rubles ($4.47 million) from people's bank accounts and already one of the most wanted hacker in the world. But now, "Hermes" is, has been tapped over six million computers and earns around 5 million francs, was caught in Russia.

Anonymous hackers take down MTNL website

New Delhi: A hacking group said it attacked the Mahanagar Telephone Nigam Limited (MTNL) website, accusing the company of censoring content on the Internet.
The corporate website of MTNL, which caters to the major Indian cities of New Delhi and Mumbai, was down for at least six hours. A post on hacking group Anonymous India's blog said the company was attacked because it had blocked several file sharing websites.

But MTNL officials denied any knowledge of an attack.

Open Source Technologies: Enchanting Charge in India

Technology; a vast term to understand and to explain, however it becomes more complicated and difficult when it keeps changing very often. There are lots of technical glitches which every technical person face. In today’s computer Modernization, Security is the biggest challenge for every Technology and to implement it is another good question.

Find System Vulnerabilities before Someone else does

Now a days where Hacking attempts are rising with the an increased speed, the security breaches are more and it is just because of the security loopholes which are available in our system. It is very important for each computer user to check the system vulnerabilities to make sure that the computer is secure enough from the external attacks.

To check the system vulnerability, it is important to block the open ports through which the malicious content effect a machine. So let us understand what are different types of ports and how to scan them from security point of view.

Syndicate content