Atul Gupta

25 Flips | 1 Magazine | 8 Likes | 1 Follower | @AtulGupta20b3 | Keep up with Atul Gupta on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Atul Gupta”

How To: Flood Your ISP with Random, Noisy Data to Protect Your Privacy on the Internet

Net neutrality is dead and your internet service providers can collect all the data they want. While VPNs are a great way to protect some of that …

White Hat

My deep dive into one of the largest dark web hacking forums | Dylan Curran

I spent three weeks studying FreeHacks, one of the dark web’s biggest platform for hackers. From passports to credit cards, nothing is safe<p>The darknet (or dark web) is one of the most fascinating vestiges of humanity we’ve ever seen. It’s an aggregated swamp of all the darkest aspects of internet …

Credit Cards

How to delete yourself from the Internet

Data breaches. Identity theft. Bank fraud. Every week, we read a fearsome new headline about cybercrime. Reputable services fall victim to anonymous hackers. Ransomware holds random computer user’s files hostage. And what about those websites that track your every move, targeting you with …

1 Interview Question That Reveals the Right Job Candidate, Regardless of Intelligence or Experience

You should always aim the bar high for hiring your knowledge workers. This question will tell you who they really are.<p>Billionaire Warren Buffett, chairman and CEO of Berkshire Hathaway, once gave sound hiring advice:<p>You're looking for three things, generally, in a person: intelligence, energy, and …

How to stop Memcached DDoS attacks with a simple command

Building a slide deck, pitch, or presentation? Here are the big takeaways:<p><i>The Memcached vulnerability has been used in record-breaking DDoS attacks</i> …

Information Security

6 Best Open source Personal Cloud Software to Setup Cloud storage

The huge content creation of images, videos, documents and other files from different digital devices increases the demand for storage devices and …

Software

Paypal was used to launder Russian trolls' money during the 2016 election

Russian trolls used Paypal to sow chaos in the 2016 US election, according to special counsel Robert Mueller’s indictment today of 13 Russian nationals.<p>The indictment accuses members of the St Petersburg “troll factory” Internet Research Agency of paying for online ads using Paypal. The ads were …

Quantum Hacking Could Be 'Catastrophic' If We Don't Develop Better Cryptography

Your data may be safe from a quantum attack... for now. When quantum computers develop the ability to crack present-day encryption mechanisms, will …

21 Books That Every High School Needs To Teach Their Students

There's been a lot of debate in recent years over what books should be included in students' English curricula, but I think we can all agree that …

With WPA3, Wi-Fi security is about to get a lot tougher

Finally, a security reprieve for open Wi-Fi hotspot users.<p>At last, Wi-Fi security -- or lack of -- is about to get its day in the sun.<p>The Wi-Fi …

Retefe banking malware now using leaked NSA EternalBlue exploit that helped spread WannaCry

The malware has previously targeted banks in the UK, Sweden, Austria, Switzerland and Japan.<p>Cybercriminals operating the Retefe banking Trojan have …

Hackers offered $500,000 for WhatsApp and Signal exploits

How much is your privacy worth? Does $499,999 sound about right? Because it might soon be sold out for only a dollar more.<p>A company that specializes …

Serverless May Kill Containers

Innovation in serverless is outpacing the maturing of Kubernetes and other container management tools. This bodes well for serverless and not so well …

Researchers Win $100,000 for New Spear-Phishing Detection Method

Facebook has awarded this year's Internet Defense Prize worth $100,000 to a team of researchers from the University of California, Berkeley, who came …

University of California

China launches cyber-court to handle internet-related disputes

In Hangzhou, the ‘capital of Chinese e-commerce’<p>China’s new cyber-court in the city of Hangzhou will start hearing cases today that exclusively deal with e-commerce and internet-related cases, according to <i>China Law Blog</i>. The court will have the ability to handle all aspects of a case online from …

A Cyber Security Investment Strategy For The Future

Investment Thesis<p>The cyber security industry has picked up steam lately and is a good way sector within the technology industry to become invested …

Cybersecurity

When is a Barracuda not a Barracuda? When it's really AWS S3

Now you can replicate backups to Barracuda's actually-Amazonian cloudBarracuda's backup appliances can now replicate data to Amazon’s S3 cloud silos.

Top 5 tools to protect internet privacy

Years ago when Google, Bing, Yahoo, Facebook, Amazon, and hundreds of other organizations began harvesting and monetizing user data, the public …

Here Are 9 Things Larry Page Couldn't Remember About Google In His Uber–Waymo Deposition

There’s a lot that Google cofounder Larry Page seemingly doesn’t know about Google.<p>Page, the CEO of Google’s parent company, Alphabet, displayed his apparent lack of knowledge during questioning on July 17 as part of Alphabet’s lawsuit against Uber over self-driving car technology. On Wednesday, …

Trucking

DevOps Security & the Culture of 'Yes'

Communication, collaboration, and the use of production data to drive decisions are essential for security work in a DevOps world.

What should you do before tomorrow’s Bitcoin split?

August 1st is almost upon us and the great Bitcoin “hard fork” is about to confuse the heck out of the casual cryptocurrency observer. Here’s what you should know.<p><b>Quite simply, if you are using an exchange that is explicitly in support of the Bitcoin Cash or you control your own private keys then</b> …

DHS cyber shakeup faces new hurdles

An effort in Congress to reorganize the Department of Homeland Security’s cybersecurity efforts is finally gaining steam, but faces an uncertain fate …

Homeland Security

Homograph attacks bring new level of spoofing

ESET researchers are warning users to beware of homograph attacks or spoofing attacks which mimic legitimate domains using Unicode characters from …

Liability of unauthorised e-banking transactions is on banks now

I do not know how many of you have read the directions issued by the of the Reserve Bank of India recently to all banks on ‘limiting the customer …