Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 Hackers

Infradapt Blog

This is some blog description about this site

Zero Trust: Is this a Wise Data Security Policy?

Zero Trust: Is this a Wise Data Security Policy?
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

b2ap3_thumbnail_no_trust_data_protection_400.jpgSometimes it seems like the Internet is plotting against you, and nothing is safe, ever. Even if you don't have any thugs waiting to steal your data, there are hackers - thieves - who will steal it anyway, waiting to take it when you least expect it. One of the most secure ways to protect your company's digital assets is to enact a "zero trust" policy for your network.

Continue reading
0 Comment

Warning: Cryptowall 2.0 Ransomware is as Bad as They Come

Warning: Cryptowall 2.0 Ransomware is as Bad as They Come

b2ap3_thumbnail_ransomware_cryptowall_400.jpgBe advised, there's a new digital threat on the scene that you and your employees need to be aware of. Known as Cryptowall 2.0, it's a wicked virus that has the potential to encrypt and steal your files, making it the scariest thing to hit your front door this Halloween season.

Continue reading
0 Comment

Russian “Sandworm” Hack Reveals 5-Year Cyber Espionage Campaign

Russian “Sandworm” Hack Reveals 5-Year Cyber Espionage Campaign

b2ap3_thumbnail_watch_out_for_sandworms_400.jpgA cyber espionage campaign called "Sandworm" has been discovered recently. The hacking attack, said to be based in Russia, has been targeting government leaders and organizations since as early as 2009. The researchers responsible for the discovery, iSight Partners, came to this conclusion after examining the code used in the campaign.

Continue reading
0 Comment

The End of an Era: the Harkonnen Hacking Operation is Over

The End of an Era: the Harkonnen Hacking Operation is Over

b2ap3_thumbnail_harkonnen_hackers_400.jpgFor the past 12 years, the Harkonnen Operation has plagued Europe. The malware campaign, operating scams in Germany, Switzerland, and Austria since 2002, has finally ended, but that doesn't change the fact that it may be the most long-lived malware to have existed. What kept security firms from discovering these attacks and preventing them for so long?

Continue reading
0 Comment

Beware of Government-Grade Malware - Especially from Hackers

Beware of Government-Grade Malware - Especially from Hackers

b2ap3_thumbnail_government_grade_malware_400.jpgThanks to Edward Snowden's revelations concerning the National Security Agency's (NSA) questionable online practices, we now know that there are ways that we can be watched by others and not even know about it. But what's really scary is that malware exists that can accomplish this same goal.

Continue reading
0 Comment

Joomla! Debug Console

Session

Profile Information

Memory Usage

Database Queries