Amerjit Deu

Amerjit Deu Author, LeakData & World Amerjit is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. He lives in New York.

More stories

  • ,

    Feds Drop Child Pornography Case to Protect Exploit Code

    Federal prosecutors in the United States have opted to drop charges against a child pornography suspect rather than reveal the hacking technique used to ensnare him – a move that is sparking heated debate. On March 3, rather than detailing those techniques, the government filed a motion in U.S. District Court in Tacoma, Wash., to […]

  • ,

    Heartbleed Lingers: Nearly 180,000 Servers Still Vulnerable

    Nearly three years after it was discovered, Heartbleed lingers on. A report from Shodan, a search engine for internet-connected devices, says that a Jan. 22 search identified 199,594 internet-connected devices that still remain vulnerable to the Heartbleed bug. “Legacy security issues go on and on and on and on.”  Heartbleed is the nickname for a […]

  • ,

    Obama Commutes Sentence of WikiLeaks Leaker Manning

    In his final days in office, President Barack Obama has commuted the prison sentence of Chelsea Manning, a U.S. Army private whose transfer of classified data to WikiLeaks kicked off a startling era of secrets spilling that continues to shape world politics. The shortening of Manning’s sentence also came with a pardon for Gen. James […]

  • ,

    ATM Malware Retooled to Strike More Machines

    In early 2013, cybercriminals began deploying in Mexico what some security experts described as one of the most advanced pieces of malware that’s ever been built to steal money from ATMs. Nicknamed Ploutus, it evolved to become the first ATM malware that could be controlled remotely by a mobile phone. Ploutus, which appeared in Latin […]

  • ,

    Health Data Exchange: 3 Key Security Steps

    Three critical issues that must be addressed to pave the way for broader exchange of health information are expanding the use of multifactor authentication and data encryption and making broad improvements in identity management, says David Kibbe, M.D., president and CEO of DirectTrust. The healthcare sector is facing a new wave of uncertainty – ranging […]

  • Hot

    , ,

    Researchers Warn Against “free internet without Wi-Fi” WhatsApp Scam

    WhatsApp has lately become the prime target of malicious threat actors and scammer probably due to the widespread global following that the platform enjoys. Eset Security researchers are unearthing one scam after another that is making use of WhatsApp. On the other hand, scammers are coming up with innovative new strategies to lure victims towards […]

  • , , ,

    LA College Hit By Ransomware: Pays $28,000 to Unlock Files

    Cybercriminals are now using new techniques to infect users with ransomware in order to make easy money. That is exactly what happened with Los Angeles Valley College (LAVC) who recently had their computer systems infected. In return, the college was forced to pay the whopping sum of $28,000 (£22,500, €25,936) in Bitcoin. It all started on 30th December 2016 when the […]

  • , ,

    Wikileaks Support Account Deletes Tweet about Making Database of Verified Accounts

    Wikileaks is known for leaking data that may be impossible to get your hands on otherwise, but on 6th Jan 2017, in now a deleted Tweet from the official and verified Wikileaks support account it was stated that the organization was “thinking of making an online database with all “verified” twitter accounts & their family/job/financial/housing relationships.” It […]

  • , ,

    UK’s Largest Hosting firm 123-Reg ‘Pounded’ by DDoS Attack

    UK’s largest domain registrar provider 123-reg has become a victim of a DDoS attack after which its users couldn’t access their email accounts as well as websites. This is only the beginning of 2017 and the hosting platform has suffered another big blow. The news about these attack was announced formally by the company via […]

  • , , , ,

    How to use “Find my iPhone” app to locate your smartphone

    Our mobile phones are nothing short of a treasure trove of sensitive, private information. We have started relying a lot on our cellphones and store almost everything from pictures to videos, contact numbers and personal communications on these tiny devices. We never think about the fact that stealing or losing such tiny phones is always […]

  • Popular

    , , ,

    Azerbaijani hackers leak secret data from Armenian Intel server

    The cyber war between Azerbaijan and Armenian hackers is as complicated and serious as one can imagine. While militaries of both countries are fighting for a piece of land, their hackers are targeting each other on the Internet. The latest cyber attack comes from Azerbaijani hackers going by the handle of Anti-Armenia Team who claim to […]