IT security refers to the security of the system. Due to the fast and rapid growth of technology, it is essential to secure the network of any organization. The attacks of hackers are getting more and more sophisticated and difficult to deal with. Therefore, it is absolutely crucial to keep up to date with the latest news in IT security and the latest development in this field.
Blackmailing using Personal images or texts
It has been common in 2018 that hackers have been hacking the social media of an individual and then threatening to expose their personal pictures in social media unless they pay them some amount. The common pattern of the threat email starts with them writing the password and then claiming they have some recording of the victim in compromising positions. Upon researching it was found later that much of the threatening emails were fake and they had no private images or messages of the person they are trying to extort from. Though they didn't have anything to blackmail, they were using fear to get financial gains. Everyone should be careful around the webcam as it is connected to the internet irrespective of the fact it is on or off.
Hacking of IT giant Wipro
Wipro is an Indian Information Technology outsourcing company which has been claimed to be hacked by someone anonymously. According to them, the hackers are now using them to launch attacks against Wipro's customers. Once they were approached by KrebsOnsecurity the executive in Wipro evasively dodged the question and later released a statement saying that they have the best security system and denied that they were hacked.
Blackmailers hacking nest camera and threatening to kidnap babies
There were reports saying that a Texas couple heard disturbing noises in their babies room. As they entered they heard a strange man's voice coming from the nest camera and he was threatening to kidnap the baby. There were many similar reports of people being threatened after their nest camera was hacked. These indicate how important security is for an individual or any organization to avoid being extorted by any hacker.
Blackmailing to cancel a hit
In this event, a poorly written email was sent to a person that the sender owned a darknet website where he got the recipients name and email. he was generally offering the recipient a chance to cancel the hit by sending the sender of the mail $4000 by bitcoins. However, no one paid to the sender as the email was poorly written but this did not fail to reach the attention of law enforcement agency, that the hackers are trying to use fear as leverage and extort money out of people.
De-duplication
It means to eliminate the redundant data that are already present in the system. There are two types of de-duplication and they are file-level deduplication and block-level deduplication. For explaining file-level deduplication imagine three users Jhon, Ted, and Lucie all storing a data file "12" which is the same file. Now the system only stores one "12" file saving space. Again let's say Lucie changed the "12" file to "13". Then the system stores both "12" and "13" file. For block-level deduplication, it works by breaking the data into many pieces called blocks. To explain this we can think of three friends again Jon, Ted and Lucie and each of them can have different data. But let's say the data of Jon consists of block A and C while the data of Ted contains A and D and the data of Lucie contains A and E. All the data will be stored in the same data center but only the unique blocks will be stored that is A, C, D, and E.
We should keep up to date with the latest trends in IT security and subscribe to all the channel providing the contents.




