Author Details

How Important the CISO’s Role is During a Cyber Crisis 1
cybersecurity

How Important the CISO’s Role is During a Cyber Crisis

The CISO (Chief Information Security Officer) has got a very important role to play in any organization today. The...

Read More
Troublesome 1500 Hotel Chains Inadvertently Leaking Customer Data 1
GDPR

Troublesome 1,500 Hotel Chains Inadvertently Leaking Customer Data

Symantec, a mainstream antimalware vendor has disclosed the result of their study that reveals that 67% of hotel websites...

Read More
Multimedia Editing Software Hacked to Spread Banking Trojan 1
Leaks

Multimedia Editing Software Hacked to Spread Banking Trojan

The immensely popular VSDC multimedia editing software has reportedly been hacked and used to spread banking trojan. Reports say...

Read More
Julian Assanges Hacking Charges and Where It Go Wrong 1
Security News Tech

Julian Assange’s Hacking Charges, and Where It Go Wrong

Julian Assange’s lawyers want to see if hacking is protected by the First Amendment. London’s Metropolitan Police arrested Assange...

Read More
Best WordPress Plugins for Small Business Website
Web Security Internet & Network Website Security

The 10 Best WordPress Plugins for Small Business Website

Take your business to the next level in 2024, with the best WordPress plugins to? There are over 50k...

Read More
Serious Vulnerabilities Detected in the WPA3 Protocol 1
Vulnerability

Serious Vulnerabilities Detected in the WPA3 Protocol

Almost one year after its launch, some very serious vulnerabilities that could lead to online password cracking have been...

Read More
Wireless Network Security Assessment Guide 1
Network Security

Wireless Network Security Assessment Guide | 5 Step Assessment

Wireless network security is an ongoing process and you’ve got to be continually on alert since unauthorized people, including...

Read More
7 Step Guidelines Released By EU For Trustworthy AI 1
Security News

7 Step Guidelines Released By EU For Trustworthy AI

No technology raises the outright fear like artificial intelligence. And this is not something that worries the ordinary people....

Read More
All About Preventing DDoS Attack on Enterprise Networks 1
DDoS Attacks

All About Preventing DDoS Attack on Enterprise Networks

For any enterprise today, a DDoS (Distributed Denial of Service) attack could mean a real headache. Such an attack...

Read More
Hackers Can Target CT MRI Scanners
Hacks

Hackers Can Target CT, MRI Scanners & Manipulate Scan Results

This is startling indeed- Hackers can infect CT, MRI scanners with the virus, manipulate scan results and create or...

Read More

Page 18 of 96

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register