Earlier this week, in a statement, Google declared that it is issuing cash payouts to persons who help the company increase the detection capacities of its new security scanner called…
Read More
Earlier this week, in a statement, Google declared that it is issuing cash payouts to persons who help the company increase the detection capacities of its new security scanner called…
Read More
Technology is currently evolving with such a fast speed that yearly predictions of trends might appear outdated even before they go live as an article or a published blog post….
Read More

In the current cybersecurity landscape, the threats facing enterprises have evolved; and now highlight a growing level of sophistication in the methods employed by cybercriminals- as is often made evident…
Read More
LINE Corporation, Japan-based communication, today announced the launch of a public bug bounty program on the HackerOne site for pentest and HackerOne bug bounty. Started in 2011, LINE became one…
Read More
Optus, Australia’s second-largest telecom operator, officially launched its “market-leading” 5G service on Monday, with a 5G network offering on-the-go mobile connections as well as on home broadband. Optus will be…
Read More
If you own a jailbreak-free iPad, you have the assurance that your device is virus-free. Moreover, you’re safe from any vital issues caused by malware because it doesn’t target iPads…
Read More
The gaming industry, in general, is aware that attempts to login and other forms credential abuse is a problem. But maybe not as aware that they should be. According to…
Read More
This is really interesting- a popular online forum that hackers have been using to trade stolen credentials has been hacked! Reports confirm that OGusers, a popular online form used by…
Read More
As per the findings of a recent report, Malaysia still continues to attract cybercriminals despite businesses stepping up cybersecurity measures and tending to capitalize on the latest security intelligence. In…
Read More
The Cybercrime Definition Cybercrime can be defined as any criminal activity involving any networked device (computer, smartphone etc) or a network itself. In cybercrime, a computing device is either the…
Read More