SWAT TeamCall spoofing is a service that allows anyone to call a phone number and make the caller ID show any number that user desires. For example, using the service, you can call a friend and make it appear as if his own home phone is calling him. The real purpose of this service is likely mere entertainment, but in reality it has been causing a lot of chaos lately.

Read More →

The recent surge of distributed denial of service (DDoS) cyber attacks on corporate websites makes it appear like there’s a new cyber attack every day and that there is nothing that can be done to prevent them. However, the truth is that these “cyber attacks” are not as unavoidable as most people think, and can easily be prevented with the right know-how.

Read More →

In the global war on terror, governments are looking for any and every way to take down terrorist networks and interrupt their communications. In the most recent one of these attacks/communication interruptions, an unknown group of hackers launched a cyber attack on al-Qaida’s main website, temporarily taking away their main protected mode of communication, leaving them with the option of potentially exposing their identities or not communicating at all.

Read More →

With so much of our society relying on the Internet to get through the day, we can easily see how much chaos and brain-ache a virus or cyber attack can cause. For example, a cyber attack aimed at an individual can not only wreak havoc on their social and personal life, but it can also bankrupt them financially as their bank accounts can be hacked and debt piled up under their name. As for large companies, those that are attacked by cyber criminals can not only lose millions of dollars due to downtime, but they can also have their most important trade secrets stolen  and shared with their top competitors.

Read More →

Portable authenticators, tiny devices that you can carry on your keychain for an added level of security, appear to be one of the best ways to ensure that your digital identities can’t be hacked. The way that these authenticators work is by displaying a new code every 60 seconds and are entered along with a password or a pin to gain access to an account. So if a hacker was able to steal your password in some way, they would also need your personal authenticator to log into your account.

Read More →

cyber-attackWith all the commotion about how the world is becoming more and more the age of cyber attacks, the Internet is considered the battleground of future wars. With tensions rising from the last big cyber attack on Google being traced to China, government officials are trying to figure out what we would do if faced with a serious attack on our nation’s infrastructure.

Read More →