Author Details

LibreOffice OpenOffice Remote Code Execution Vulnerability Biting Casual Users

Microsoft Office for decades has been mocked for being a bloatware office suite and a favorite target of exploits...

Read More
Digital Media Security Against Corporate Cybersecurity Culture

Currently, we live in the era of digital transformation, where the logic of business and, above all, information has...

Read More
Why You Should Move to Cloud Computing

Cloud Services Infographic It’s worth it, cloud computing includes benefits and gives you the flexibility of connecting to your...

Read More
Google’s New Chrome Extension Seeks to Secure Accounts 1

Google has come up with a new Chrome extension that seeks to secure users’ accounts. The new Google Chrome...

Read More
Business Interruption Again Top Business Risk in Singapore

Business interruption once again becomes the top business risk in Singapore, according to a recent report. It is the...

Read More
Huddle House Restaurant Chain’s POS System Breached

A security breach has impacted the POS (Point of Sale) system at Huddle House, the U.S-based casual dining and...

Read More
Cyber Warfare How to Keep Your Consumer Devices Safe

According to the 2019 Cyber Threat Outlook published by defense industry firm Booz Allen Hamilton, the year 2019 is...

Read More
Did Apple Really Ban Facebook and Google’s Apps

As reported in TechCrunch Google and Facebook have been violating Apple’s policies, using apps that tracked user behavior outside...

Read More
Malicious ‘Beauty Camera’ Apps that Steal Personal Pictures

At least 4 million Android users have reportedly got their devices infected with malicious beauty camera apps that are...

Read More
Key Things to Scale The Internet of Things

IoT success. The companies that succeed in transforming their operations and business models through IoT are those that will...

Read More

Page 37 of 97

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register