Hackers are exploiting vulnerabilities to steal crypto currency. In a recent attack, they stole over 153,000 Ether, which approximately translates to over $30 million dollars. A considerable amount, it is….
Read More
Hackers are exploiting vulnerabilities to steal crypto currency. In a recent attack, they stole over 153,000 Ether, which approximately translates to over $30 million dollars. A considerable amount, it is….
Read More
Educate teenagers about the ill-effects of drugs and chances are they might refrain from doing them. On the other hand, ‘order them’ not to do drugs, and chances are they…
Read More

The Internet of things (IoT) is getting physical devices, vehicles and other smart devices, and even buildings, embedded with software, electronics, sensors, and network connectivity. The Internet of Things is…
Read More
Reports are that Symantec, one of the leaders in the international market for SSL certificates, in a recent move, is thinking of selling its web certificate business, so as to…
Read More
A survey of top cyber security professionals reveals that they fear a massive cyberattack on U.S. critical infrastructure. And many believe that this massive attack is not far away. They…
Read More
The data breach at the United States Office of Personnel Management (OPM) in 2015 was a wakeup call for the U.S. Government. It was just what many government officials had…
Read More
Apple Inc. will soon be storing cloud data of its Chinese customers with a Chinese government-owned company in accordance with the latest cyber security laws of China. The southern province…
Read More
Support for Artificial Intelligence (AI) is growing in many fields, and cyber security is no different. Prompted by this trend, NVIDIA has invested in Deep Instinct, an Israeli startup focused…
Read More
Brain chips are being developed. Brain-computer interfaces (BCIs) or brain-machine interfaces (BMIs) that can connect the human mind to computers are being developed and significant progress has been made. Actually,…
Read More
Cyber awareness has to be implemented to enhance cyber hygiene. Users have become accustomed to spending lots of time online, but are not generally aware of the size and scope…
Read More