Leaks

clients diversify 1

Key Expectations From A Top Software Developer

Obviously, the demands with regard to a specific software product vary a lot depending on the client and his needs. Big corporations would usually lean towards resourceful and complex projects…

Read More
cyber crime 2

Cybercrime Evolution: 2017 is for Ransomware, while 2018 is for Cryptojacking Malware

The growth of Bitcoin and its derivative cryptocurrencies have expanded people’s point-of-view on what it really is, a new representation of real-world money. We used to associate money to currency,…

Read More
Open EDR
Atrium Health’s 2.65 Million Patient Records Databreach Publicly Revealed Only After Two Months

Atrium Health’s Databreach: 2.65 Million Patient Records Publicly Revealed

Atrium Health, formerly Carolinas HealthCare System, which touted itself as ‘one of the nation’s leading and most innovative healthcare organizations’ has publicly disclosed that their system supplied by AccuDoc Solutions…

Read More
SingHealth Breach Prompts Strong IT Defence for Healthcare System

SingHealth Breach Prompts Strong IT Defence for Healthcare System

The most serious breach of data in the history of Singapore happened last month when SingHealth reported that 1.5 million patient records were breached. According to Strait Times, among those…

Read More
Popular Cyberattack Methods Used by Hackers to Attack Businesses

Popular Cyberattack Methods Used by Hackers to Attack Businesses

We are into the fourth quarter of 2018 and there are no signs of cyberattacks slowing down. Reports indicate that over the first three quarters of the year, cyberattacks were…

Read More
Facebook removes suspected Russian accounts

Two-Factor Authentication Controversy Facing Facebook, User Mobile Numbers Used for Ads

Two-factor authentication has been a near silver-bullet that prevents phishing attacks and online account thefts. It is very effective, as it provides the user a virtual “second password”, which disables…

Read More
Ransomware Fileless Attacks and Cold Boot Impacting Enterprise Networks

Ransomware, Fileless Attacks and Cold Boot the Current Trend

A new breed of cyberattacks- ransomware, fileless attacks and cold boot- have been impacting enterprise networks worldwide and proving to be a real headache to many. The ransomware menace The…

Read More
The Dark Web is Coming to Your Mobile Phone

The Dark Web is Coming to Your Mobile Phone

Deep web and privacy enthusiasts have a lot to rejoice for as the Tor Project has announced that their popular Tor Browser is now available for Android. Members of the…

Read More
U.S Lawmakers Slam Google CEO for Declining to Testify at Senate Hearing

U.S Lawmakers Slam Google CEO for Declining to Testify at Senate Hearing

U.S lawmakers, a bipartisan group of them, have joined hands in slamming Google’s CEO for declining to testify at the Senate hearing next week. Fox News reports- “On the same…

Read More
Google Blocks YouTube Account linked to Iran

Google Blocks YouTube Account linked to Iran

In a recent statement Google said that it has disabled 39 YouTube Channels associated with Iranian state broadcaster, which is running a political campaign to influence its viewers. Google said…

Read More

Page 9 of 12

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register