Author Details

samsung
Leaks

Samsung Sued Over Recent Data Breaches

Two Samsung customers, who are being represented by Clarkson Law Firm, have launched a class action lawsuit against the...

Read More
Leaks

Vulnerabilities in the iBoot Power Distribution Unit Let Hackers Remotely Shut Down Devices

Researchers found serious flaws in Dataprobe’s iBoot power distribution unit (PDU), which may be used by hostile parties to...

Read More
computer girl
Leaks

novoShield Emerges From Stealth With Mobile Phishing Protection App

With an enterprise-grade iPhone protection app, mobile phishing defense firm novoShield has come out of hiding. According to novoShield,...

Read More
Geoscience Australia Highly Vulnerable to Cyber Attack min
Leaks

FBI Issues Warning About Increase in Attacks Against DeFi Platforms

The FBI has issued a warning about an uptick in hacks aimed at stealing cryptocurrencies from decentralised finance (DeFi)...

Read More
Geoscience Australia Highly Vulnerable to Cyber Attack min
Leaks

Security Firm Discloses CrowdStrike Issue After ‘Ridiculous Disclosure Process’

Crowdstrike Problem: Following what it referred to as a “ridiculous vulnerability disclosure process,” a security company has revealed the...

Read More
DDoS Attackers
Leaks

Ring Android app flaw allowed access to camera recordings

In the Amazon Ring app for Android, Amazon has patched a high-severity vulnerability that may have let hackers download...

Read More
Threats

What Is Advanced Threat Protection?

Advanced Threat Protection, or ATP, is a type of security solution specifically designed to defend a network or system...

Read More
Leaks

Security as a Service: Why Apply for SECaaS?

In today’s corporate environment, businesses and organizations rely heavily on services. This is especially true for their IT department,...

Read More
GDPR

What Does GDPR Mean for Your Organization?

GDPR ,or the General Data Prevention Regulation, is a new law that has been enforced by the European Union...

Read More
Security & Privacy

The Five Incident Response Steps

It is important to remember that implementing incident response steps is a process and not an isolated event. For...

Read More

Page 1 of 97

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register