Author Details

All about Data Breaches How They Happen and Their Impact

Data breaches have become very common, a data breach is no longer news- you may say! Yes, this is...

Read More
500 px data breach

500px, the popular photography app has forced all its users to reset their user passwords in a deliberate attempt...

Read More
Attackers Gain Root Access on Linux Systems via Dirty Sock Vulnerability

An article on ZedNet reads how a security researcher published proof-of-concept (PoC) code for a vulnerability impacting Ubuntu and...

Read More
Virtual Patching vs Unpatched Vulnerabilities Unleashed by Trend Micro

A major security flaw under CVE-2019-05736 that has affected runC is now patched, thanks to the hard work of...

Read More
OkCupid Users Complain of Account Hacks

Can an OKCupid account be hacked? But, then why would someone want to hack a dating account? Tough questions...

Read More
Phishing Attacks Targeted At Nokia Smartphone 1

Nokia is a failed brand in the west, including in their native Finland since the emergence of the 2007...

Read More
Clipper Cryptowallet Switcher Trojan App Quickly Deleted From Play Store

It is once again highlighted in the news, the need for Android users to only source their apps from...

Read More
Tools and Tips to recover a Hacked Website

Doing the right things in the right order with specialized tools is the key to recover your hacked website,...

Read More
How to Ensure Wannacry Patch is Installed Correctly On Your Machine

They say WannaCrypt does not infect XP machines but looks like the problem appears on Windows7 machines with no...

Read More
NASA’s 35 Day Partial Shutdown A Step Towards Better Lives

The 35-day long U.S. Government shutdown has not only delayed basic government services and underfunded the operations of many...

Read More

Page 35 of 97

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register