Author Details

Understanding What Is Malware Analysis

What is malware analysis? This is the process involved in studying and learning how a particular malware works and...

Read More
Zero Day Security Flaw Since Windows 98 Exposed By Google

A two-decades old security flaw in Windows and Office involving the Text Services Framework module named MSCTF has been...

Read More
Canon DSLR Camera The “Unlikely Likely” Candidate For Ransomware Infection

We are covering ransomware and the latest “innovations” to improve it at the expense of the poor victims since...

Read More
API Security Developers And Users Responsibility

The world of software development today is flooded by APIs (Application Programming Interface). We can think of whatever web...

Read More
Data Loss Prevention How to Prevent Your Data From Disappearing

Data loss is one of the biggest security concerns of companies, especially those that handle sensitive data like bank...

Read More
IoT capable Printers Becoming Unofficial Gateways For Cyber Attacks

The printer started as a simple device for printing on paper, providing users with a physical copy of their...

Read More
Security Issues Related to Using Cloud Based Management Tools

There are six security issues related to using cloud based management tools that organizations need to be aware of...

Read More
Twitter Bug Exposes User Information To 3rd Party Advert Providers

Micro-blogging site Twitter has disclosed that some of their advert partners are abusing a bug in their system that...

Read More
How Can You Protect Your Data

In the world of digital technology, almost everything is on the internet, including your personal data. If this falls...

Read More
GermanWiper A Diabolical Ransomware Targeting German PC Users

Have you heard of GermanWiper? No, it is not a brand of shaving razor or tissue paper in Germany....

Read More

Page 3 of 97

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register