Author Details

The Archilles Hill Of Traditional Antivirus Software Fileless Malware

A typical antivirus products and End Point services today generally speaking comes with two ways of detecting malware: Signature-based...

Read More
Will AI Solve the Gaming Industry’s Cybersecurity Issues

Over the last few years, several gaming platform-based cyber attacks have come to light. Given the rise in microtransactions...

Read More
Norsk Hydro Fallen Victim To A Serious Ransomware

Ransomware played havoc in 2017, and later in 2019, we all thought that hackers have moved on to crypto...

Read More
Threat Intelligence With 2 Most Used Operating Systems

With 4.312 billion users in the world, comprising 55.6% of the global population, the Internet has become an everyday...

Read More
Endpoint Detection and Response Emerging Technology

Endpoint Threat Detection and Response (ETDR), the term was first coined by Gartner’s Anton Chuvakin in 2013, he said:...

Read More
Boon or Bane Growth Of Public Open Wi Fi

With the growth of telecommuting and commoditization of Internet-connected devices, the use of Wi-Fi has become as normal as...

Read More
Commonwealth Floats Increased Penalties For Privacy Breaches 1

It was in November, 2012, when the first time The Australian Privacy Commissioner announced that under a new law,...

Read More
UTM – The All In One Network Firewall

Ever since its inception, the firewall was merely to filter traffic based on IP addresses and ports. It became...

Read More
European Android Devices Google Is The Old Microsoft 1

The European Union has flexed its muscles again to combat anti-competitive behavior. This time around, it is Google that...

Read More
Google Still Going Strong Even After 3rd Antitrust Fine 1

As we can remember, Google uses its strong influence in the market in order to get ahead of their...

Read More

Page 26 of 97

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register