Skip to main content

Hackers Won’t Stop: 888 Data Breaches So Far In 2015 and 246 Million Records Lost (CTNews)




The first half of 2015 has been rocked by 888 incidents data breaches so far, leading to 245.9 million records compromised worldwide, as surveyed by Gemalto. It looks as if there is no end to hack attacks.


As of today, data or information values much higher than money. The immense number of security breaches and hack attacks just prove the point. This year has seen a circumstantial increase in the malicious cyber attacks over the several governments and private firms.

Gemalto, a digital security firm has revealed in its study that in the first half of 2015, there were 888 data breaches leading to 245.9 million records compromised worldwide. What’s worrying is that in approximately 50% of the cases, the amount of data exposed is still unknown. According to IBM, hackers frequently use Tor network for launching hack attacks.

The biggest data breach of this year exposed 78.8 million identity records from Anthem Insurance comprising 32% of the total theft. This was the first in the line of several state-sponsored cyber attacks to follow. 21 million records from the United States Office of Personnel Management, 20 million records from Russia’s dating site Topface, and 10 million record information from India’s Gaana.com  are some of the biggest breaches to take place in 2015.




The top security firms have admitted that these type of incidents are unavoidable. China has come up with a hack proof Quantum communication network as a viable solution that they will launch in 2016. Now only time will tell how effective the network is.

The top 10 data breaches make up for 82% of the total information compromised. In the United States alone there were 671 reported data breaching incidents. Second in line is the UK where its citizens were exposed to 63 hack attacks.

The DDoS attacks this year have also increased by 132% compared to last year.  

Comments

Popular posts from this blog

Kali Linux Commands Cheat Sheet

Kali Linux commands cheat sheet. All basic commands from A to Z in Kali Linux has been listed below. A   -> apropos : Search Help manual pages (man -k)  -> apt-get : Search for and install software packages (Debian/Ubuntu)  -> aptitude : Search for and install software packages (Debian/Ubuntu)  -> aspell : Spell Checker  -> awk : Find and Replace text, database sort/validate/index B  -> basename : Strip directory and suffix from filenames  -> bash : GNU Bourne-Again SHell  -> bc : Arbitrary precision calculator language  -> bg : Send to background  -> break : Exit from a loop  -> builtin : Run a shell builtin  -> bzip2 : Compress or decompress named file(s) C   -> cal : Display a calendar  -> case : Conditionally perform a command  -> cat : Concatenate and print (display) the content of files  -> cd : Change Directory  -> cfdisk : Partition table manipulator for Linux  -> chgrp : Change group owne

How to Install and run Kali Linux on any Android Smartphone

Tutorial for installing and running Kali Linux on Android smartphones and tablets Kali Linux is one the best love operating system of white hat hackers, security researchers and pentesters. It offers advanced penetration testing tool and its ease of use means that it should be a part of every security professional’s toolbox. Penetration testing involves using a variety of tools and techniques to test the limits of security policies and procedures. Now a days more and more apps are available on Android operating system for smartphones and tablets so it becomes worthwhile to have Kali Linux on your smartphone as well. Kali Linux on Android smartphones and tablets allows researchers and pentesters to perform ” security checks” on things like cracking wep Wi-Fi passwords, finding vulnerabilities/bugs or cracking security on websites.  This opens the door to doing this from a mobile device such as a phone or a tablet. You can also install Kali Linux Distribution

The History of Apple mac OS Malware (CTNews)

Mac Malware : A Brief history of malware for Apple’s Mac OS from 2004 to present Mac users are pretty sure Apple’s integrated systems will never encounter any malware, how true is that? Lets check a brief history of Mac malware. Microsoft Windows users were the ones who were mostly affected with the computer malware, trojans, viruses. Just a few decades back, Mac users, on the contrary, would always feel proud to be using the right equipment because they believed Apple’s integrated systems would never encounter any malware. However, security researchers would tell us a different story.  Few decades back, Microsoft Window’s larger user base made it easy for hackers to target the user of this OS. However, now Apple’s market and in turn Mac users are also growing and at the same time Mac-oriented malware too is gaining popularity. This article is a recap of Apple’s complicated history with malware. 2004: Renepo: A shell script worm : This was designed specific