Author Details

New Hacking Technique Using Bluetooth Exposed

Bluetooth makes it easy to transfer files, photos, and documents to devices, such as mobile phones, PDAs, and laptops...

Read More
Remove TV Adware With These Easy Steps

It may be irritating, your screen is full of ads, and when you close one, another appears. Yes, we...

Read More
Google Acknowledges Having Android Backdoor Triada

On June 6, 2019, Google released a case study of very intelligent hackers who were trying to plant backdoor...

Read More
Cases of Cyber Attacks in Kenya Rise to 11.2 million

Security researchers have found that 11.2 million cyber-attacks hit organizations in Kenya in the first quarter of 2019, this...

Read More
Malicious Torrent GoBotKR Targets South Korean TV

ESET researchers detected an ongoing malicious campaign by distributing backdoor torrents, using Korean TV content, and sometimes games like...

Read More
Digital Transformation and Implementation of Information Security

Security has been a major concern for everyone recently, especially for companies that use technology as the main component...

Read More
2018 British Airways Breach  £183 Million Fine Imposed

British Airways is now in hot water, as they are facing a £183-million fine in order to compensate the...

Read More
Beware of Fake Samsung Firmware Update App 1

Are you a Samsung smartphone user? Then this news item is for you; we recommend to only accept official...

Read More
Understanding the Difference of Multi tenant SaaS

Why would you consider using a multi-tenant SaaS? What are its advantages? In the earlier days of the cloud,...

Read More
What is Data Exfiltration and How to Prevent

Defining Data Exfiltration Also referred to as data theft or exportation, data exfiltration is when an unauthorized transfer of...

Read More

Page 6 of 97

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register