Author Details

The May 2017 Cyberattack on the FCC That Never Happened
Security News

The May 2017 “Cyberattack” on the FCC That Never Happened!

As per recent reports, the official website of the FCC (Federal Communications Commission) hadn’t fallen victim to cyberattacks last...

Read More
The Story of Security in the History of Computing
Malware

The Story of Security in the History of Computing

During the decades gone by, a company that used a computer system for some sort only had two variables...

Read More
SingHealth Cyberattack Allegedly the Work of Sophisticated APT Group
Cyber Crime

SingHealth Cyberattack Allegedly the Work of Sophisticated APT Group

The SingHealth cyberattack, which resulted in personal data of about 1.5 million patients getting stolen from SingHealth’s IT database,...

Read More
Google’s Android 9 Pie the new Android
Mobile Security

Google’s Android 9 Pie the new Android

The most recent arrival of Android is here! Also, it accompanies a ton of mechanism of artificial intelligence to...

Read More
145 Windows malware loaded Play Store Apps deleted by Google
Malware

145 Windows-malware loaded Play Store Apps, deleted by Google

Google, upon the advice of Palo Alto Networks from last week, has deleted 145 apps in its Google Play...

Read More
BitPaymer Malware renders Mat Su Alaska Government to Reuse Typewriters
Tech

BitPaymer Malware made Mat-Su Alaska Gov’t to Reuse Typewriters

Electromagnetic pulse (EMP) attacks can render our advanced technology to recede as back to pre-industrial revolution stage. In other...

Read More
Phishing Attacks

Customized Phishing Campaign that target High-Profile Business

A modern phishing campaign focusing on the industrial sector appears once again and demonstrated how attackers are continually enhancing...

Read More
Why Penetration Testing is Important
Vulnerability

Why Penetration Testing is Important

For enterprises, encountering IT security vulnerabilities have become common incident around their enterprise networks and IT systems. These IT...

Read More
GDPR and Its Possible Impacts on Nigerian Businesses
GDPR

GDPR and Its Possible Impacts on Nigerian Businesses

The GDPR (General Data Protection Regulation) is now operative; it certainly is going to have its impact on the...

Read More
From 1.2 million to 10 million Dixons Carphone Admitted a Bigger Data Breach
GDPR

From 1.2M to 10M, Dixons Carphone Admitted a Bigger Data Breach

In a public press release, Dixons Carphone, a mainstream European electrical and telecom retailer/services firm, announced that it became...

Read More

Page 62 of 96

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register