Skip to content
Qadit Blog

Qadit Blog

Information Security, SSAE 16, ISO 27001, CISA, Cert-IN

Month: January 2014

Posted on January 31, 2014February 12, 2014

OKI enters Indian market

With the delivery this week of an order of ATM-Recycler G7s to the State Bank of India, Japanese manufacturer OKI has achieved its stated objective of entering India’s booming ATM market.

Read more here

Posted on January 30, 2014February 12, 2014

Using USB Modems to Phish and Send Malicious SMS Messages

Some USB modems can be leveraged to send malicious SMS messages and carry out spear-phishing attacks – sometimes in conjunction with each other – thanks to a cross site request forgery vulnerability present in the device’s web interfaces.

Read more.

Posted on January 30, 2014February 12, 2014

‘123456’ giving tough competition to ‘password’ in Worst 25 Passwords of 2013

From 2012, the only change till now is that the string “password” has shifted to the second place in a list of the most commonly used passphrases and string “123456” has taken the first place recently, according to an annual “Worst Passwords” report released by SplashData, a password management software company.

Read more.

Posted on January 30, 2014February 12, 2014

Bangladeshi Hackers defaced BCCI website after Board approves ICC takeover proposal

Apart from various Government websites falling victim to Hacking attacks, the latest to be targeted by hackers belongs to the world’s richest cricket Board, the Board of Control for Cricket in India (BCCI).

Read more.

Posted on January 30, 2014February 12, 2014

Coca-Cola apologises for unencrypted laptop theft that left thousands compromised

Coca-Cola has apologised for compromising thousands of people by allowing unencrypted company laptops to be stolen from its headquarters in Atlanta.

The company confirmed in a statement sent to The INQUIRER that the theft might have compromised the personal information of around 74,000 individuals.

Read more

Posted on January 30, 2014February 12, 2014

Suspected Email Hackers for Hire Charged in Four Countries

Eleven people were charged in the U.S., India, China and Romania for their suspected involvement with websites offering email hacking services.

Read more.

Posted on January 30, 2014February 12, 2014

INSIGHT: Insurance can cover losses from cyber attack

Every company is at risk for a cyber attack. Cyber attacks are increasing with unprecedented frequency, sophistication and scale.

Read more.

Posted on January 30, 2014February 10, 2014

Updates on the Target breach

Some more information has been unearthed about the Target breach.

Posted on January 26, 2014February 11, 2014

The ‘Certificate Transparency’ Initiative

Before we get into what is certificate transparency and why there is a Google initiative currently running to implement this, let’s understand a bit of the background.
Continue reading “The ‘Certificate Transparency’ Initiative”

Posted on January 23, 2014February 12, 2014

Neiman Marcus Breach

Another breach in the retail industry – The Neiman Marcus Breach
Continue reading “Neiman Marcus Breach”

Posts pagination

Page 1 Page 2 … Page 5 Next page

Recent Posts

  • Digital Personal Data Protection Act, 2023: An Interpretative Overview for Professionals
  • Implementing Trustworthy AI: A Practical View of ISO/IEC 42001:2023
  • Securing Oracle Cloud Infrastructure (OCI)
  • RansomExx Upgrades to Rust
  • KmsdBot, a new evasive bot for cryptomining activity and DDoS attacks

Recent Comments

    Archives

    • December 2025
    • April 2023
    • November 2022
    • May 2022
    • March 2021
    • December 2020
    • November 2019
    • October 2019
    • July 2019
    • June 2019
    • April 2019
    • March 2019
    • January 2019
    • December 2018
    • November 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • September 2017
    • August 2017
    • February 2017
    • November 2016
    • October 2016
    • September 2016
    • August 2016
    • July 2016
    • June 2016
    • May 2016
    • September 2015
    • August 2015
    • July 2015
    • June 2015
    • May 2015
    • April 2015
    • March 2015
    • February 2015
    • January 2015
    • December 2014
    • November 2014
    • October 2014
    • September 2014
    • August 2014
    • July 2014
    • June 2014
    • April 2014
    • February 2014
    • January 2014
    • December 2013
    • November 2013
    • October 2013
    • September 2013
    • August 2013
    • July 2013
    • June 2013
    • May 2013
    • March 2013
    • February 2013
    • December 2012
    • November 2012
    • October 2012
    • September 2012
    • December 2011
    • November 2011
    • October 2011
    • September 2011
    • August 2011
    • July 2011
    • June 2011
    • May 2011
    • April 2011
    • March 2011
    • February 2011
    • January 2011
    • December 2010
    • November 2010
    • October 2010
    • September 2010
    • August 2010
    • July 2010
    • June 2010
    • May 2010
    • April 2010
    • March 2010
    • February 2010
    • January 2010
    • December 2009
    • November 2009
    • October 2009
    • September 2009
    • August 2009
    • July 2009
    • June 2009
    • May 2009
    • April 2009
    • March 2009
    • February 2009

    Categories

    • Banking
    • Business Continuity & DR
    • ERP
    • Governance, Risk & Compliance
    • Information Technology
    • IT Security
    • IT Security Frauds
    • Microsoft
    • Network Security
    • OS Security
    • Uncategorized
    • website security

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Proudly powered by WordPress