Posts

Showing posts from September, 2014

Check if your Gmail password was one of millions Hacked

Image
Picture: Google Images

A list of 5 million Gmail addresses and passwords appeared on a Russian Bitcoin forum Wednesday.

It is still unclear how anyone obtained the vast collection of usernames and passwords. Google says its servers were not breached. The list appears to be a collection of passwords exposed in previous hacks — likely on users’ own computers, not Google’s systems.

“We have no evidence that our systems have been compromised,” said Google spokeswoman Caroline Matthews.

In fact, there’s no telling yet whether the list is even authentic, the company said.
However, Google is warning affected users to take steps to further protect their Gmail accounts, such ascreating a stronger password and using an extra security feature called two-step authentication.

Though the forum manager has already removed the file containing exactly 4,930,000 emails and passwords, it has led to somewhat of a digital panic as people work to learn if they have been affected.

Someone has created …

Celebs Photo Leaked - A question on Cloud Security

Image
Picture : Google Images
As technology progresses ahead with leaps and bounds, it provides us with new means and ways to carry out our day to day business. Not only it helps us in executing tasks more comfortably but also brings in the factor of safety and security in our lives.


Nowadays we hear a lot about this relatively new term ‘Clouds’ in the IT industrial sector, where data can be stored in the clouds. As with other technological advancement, as cloud technology brings a whole lot of benefits to businesses small and large, there are some security concerns as well. And it’s not just limited to corporate or commercial entities, individuals are affected by poor cloud security, particularly celebrities such as Jennifer Lawrence and Mary Elizabeth, who have recently been a victim of cloud hacking.


So before we go ahead in selecting cloud data storage for our business, there must be a check-list that should be filled to ensure that our data will be safe. Here it is:


1. Vendor Security Prot…