Browsed by
Author: Greg Swiecicki

British Airline EasyJet Suffers Data Breach Exposing 9 Million Customers’ Data

British Airline EasyJet Suffers Data Breach Exposing 9 Million Customers’ Data

The British low-cost airline has suffered as it turns out in one of the biggest hacker attacks on airlines in Europe. As a result of the attack, email addresses, personal data for more than 9 million passengers, and credit card data were stolen.

https://thehackernews.com/2020/05/easyjet-data-breach-hacking.html

New Bluetooth Vulnerability Exposes Billions of Devices to Hackers

New Bluetooth Vulnerability Exposes Billions of Devices to Hackers

Bluetooth has a vulnerability that can be used to launch attacks. It is related to the device pairing function. Specialists warn that the failure exposes a lot of devices to potentially dangerous digital interference. Hackers can access data that is sent via Bluetooth.

https://thehackernews.com/2020/05/hacking-bluetooth-vulnerability.html

Ramsay: A New Cyber Espionage Toolkit to Steal Data from Air‑Gapped Networks

Ramsay: A New Cyber Espionage Toolkit to Steal Data from Air‑Gapped Networks

The researchers confirm that the recently discovered ‘Ramsay’ cyber-espionage campaign can infect computers to steal confidential documents such as Word, PDF, and ZIP from networks with air gaps. Through a hidden folder, they can easily filter them out.

https://www.cisomag.com/ramsay-a-new-cyber-espionage-toolkit-to-steal-data-from-air%E2%80%91gapped-networks/

History

History

In today’s era, cybersecurity is essential to us. However, half a century ago, Internet 3security was not in the range. The most important thing was for the new package-based scheme to work. Protection in a harmonious team was not needed; at that time, no one had access to the network. Currently, the ubiquitous access to the Internet has caused a massive increase in the number of cyberattacks. In retrospect, it can be seen that ignoring security was a huge drawback.

Atanasoff

Atanasoff

The machine for solving systems of linear algebraic equations was recognized as the first working prototype of a specialized computer created by John Atanasoff. Inventive and unique solutions have been developed in the device. Storing numbers for use in machine calculations was a massive problem at the time. Atanasoff used capacitors to store the electric charge for his project, which was able to represent numbers in the form of logical zeros and ones. The capacitors were mounted on rotary bakelite cylinders with metal strips on the outer surface. Each cylinder could store thirty binary numbers that were read from metal belts at cylinder rotation.

“Personal Computer”

“Personal Computer”

In the world of computers, some terms are sometimes used in a surprising way, such as the expression “Personal Computer”. For example, the IBM 610 Auto-Point computer (from 1957) was described as “the first IBM personal computer” because it was designed to be operated by only one operator, but this machine was not based on the concept of program memory and it cost $ 55,000! Other candidates are LINC computers from MIT (1963), Datapoint 2200 from CTC (1971), Kenbak-1 (1971) and Xerox Alto (1973), but all of these machines were either incredibly expensive, relatively useless, or were only experimental designs .