Author Details

Beware Of Deceptive Antimalware Apps In Android 1
Android Security

Beware Of Deceptive Antimalware Apps In Android

Right after Windows, antimalware vendors have set their sights on Android as their next “platform” to protect (or at...

Read More
Best Proxy Servers of 2019 and How To Stay Safe From Hackers
Data security

The Best Proxy Servers of 2024 and How To Stay Safe From Hackers

Did you notice that while browsing, you see some of the websites are blocked or not available for your...

Read More
Facebook Suffers Biggest Ever Outage in its History 1
DDoS Attacks

Facebook Suffers Biggest Ever Outage in its History

Facebook, which has suffered the biggest ever outage in its history, is struggling to deal with it. The partial...

Read More
Factors to Consider When Securing IoT Devices 1
cybersecurity

Factors to Consider When Securing IoT Devices

Smart gadgets seek to make your home smarter and efficient, but you still need to buck up and learn...

Read More
Vulnerabilities Discovered in Swiss E Voting System 1
Vulnerability

Vulnerabilities Discovered in Swiss E-Voting System

Technical flaws were detected in the Swiss government’s electronic voting system. A team of cybersecurity researchers on Tuesday found...

Read More
An Introduction to Network Security
Network Security

F5 Networks Acquires Rival NGINX for $670 Million

F5 Networks acquires rival company NGINX in a deal that’s valued at about $670 million. Software company NGINX, which...

Read More
VPN Provider Citrix Hacked About 6 TB Data Accessed 1
VPN

VPN Provider Citrix Hacked, About 6 TB Data Accessed

Software maker and enterprise VPN provider Citrix has suffered a hack, which might have led to the hackers accessing...

Read More
SamSam Ransomware
Ransomware

SamSam Ransomware Hits Again VS Jackson County, Georgia

2017 was the Year of the Ransomware when WannaCry and its derivatives wreaked havoc to various computer installations with...

Read More
Hackers Target Premium Account Holders of Adult Sites
Hacks

Hackers Target Premium Account Holders of Adult Sites: Report

Cybercriminals now seem to be showing an increasing tendency to attack premium account holders of adult websites in a...

Read More
Secure Use Of IoT Devices Questioned Due To Bundled CoAP Protocol 1
IoT

Secure Use Of IoT Devices Questioned Due To Bundled CoAP Protocol

The growth of IoT (Internet-of-Things) in both the enterprise and at homes brought enormous convenience to users. However, the...

Read More

Page 22 of 96

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register