Security & Privacy

Articles show all possible vulnerabilities in your hardware and software that may harm your personal information

How to protect personal data on the Internet Part 1

Tell why our personal information every day are under threat, and share tips on how to protect personal information online.

Many people think that their data criminals are not interested, but experience shows that fame does not affect the willingness of intruders to acquire other people's personal information and to benefit from them. We reviewed the most popular scenarios where your data is at risk and will tell you what to do to keep personal information confidential.

Email

Cyber safety specialist hacked the drones

Indian cyber security expert Rahul Sasi (Rahul Sasi) was told about his way secretly to obtain full control of drones based on ARM Linux, steal them from the owner and even infect other drones, collecting thus the "zombie army". The results of the research he presented on January 26 in his blog.

According to the security officer of the Indian company Citrix Rahula Sasi, the threat of mass hacking of drones by real hackers. He found the vulnerability in operating systems on ARM based Linux is used in popular brands Parrot quadcopters and DJI Phantom.

What is cyber security?

Returning into the field of cyber security plan, that commenced talking each calendar year, I do wish to interest quite an intriguing regular that clarifies that theory and its connection to additional, much more recognizable into the metro terms in these advice stability. We're speaking concerning. Info technology Security systems Strategies to cyber security, that has been embraced in July this past calendar year.