Security

Mobile Security

Page 24 of 1

Android Security

GDPR

Cryptocurrency

Page 24 of 1

DDoS

Infographics

All Security News

phishing scam

21 Million Stolen Fortune 500 Dark Web Purchase Credentials

Many studies and investigations have been conducted into the number of stolen credentials on the dark web. Nonetheless, a new report recently issued is a little different: it relies on…

Read More
Data Repository Will Your Business Need One

Sensitive Data Management Guide For companies and Individuals

Keeping sensitive data secure against theft and vulnerability should be a priority for most organizations. However, this isn’t as easy as it may seem especially with new technologies and evolving…

Read More
Free Facial Recognition Tool to Track People on Social Media Sites

American Civil Liberties Union Sues FBI, DEA, and Justice Department Over Facial Recognition Secrecy

The ACLU (American Civil Liberties Union) sued the FBI, Drug Enforcement Administration (DEA), and Justice Department for records detailing their use of facial-recognition software. The ACLU lawsuit states that the…

Read More
Open EDR
Patient’s life is at risk as pacemakers are vulnerable to cyber attack

Singapore Firms Struggling To Keep Up With Software Patches

Yes, you read it right! Organizations in Singapore are struggling to cope up with the volume of software patches. According to new research released by ServiceNow, Inc has, this year…

Read More
A Guide to Cyber Security Salary

2,000 Cyber Attacks Affect Georgia Websites

About 2,000 websites in Georgia were compromised in a major cyber attack on Monday, including those of the President, courts and the press. The photograph of Georgia’s former exiled president…

Read More
Google Acknowledges Having Android Backdoor Triada

ACCC Says that Google Misleads Users about Managing Android Data Position

Consumer watchdog says Google gathers and uses location data without telling users. The Australian Competition & Consumer Commission (ACCC) is bringing up against Google and its Australian branch claims of…

Read More
The 10 Endpoint Security Products for Business 1

Fortinet is Buying Endpoint Security Agency enSilo

Fortinet announced on Monday that it has completed the acquisition of the enSilo endpoint security service, based in San Francisco. By acquiring it, Fortinet adds enSilo’s detection and response technology…

Read More
Advantages and Disadvantages of Cloud Based Proxy

Mozilla: Cloudflare Charges Us No DoH Traffic

Mozilla publishes FAQ reports that outline its implementation plans for DNS-over-HTTPS. Mozilla has today clarified that “no funds are being exchanged for DNS Cloudflare requests” as part of the DNS-over-HTTPS…

Read More
After hacking data theft European Central Bank closes its website

Texas Man is in Jail for Hacking the Superior Court for 145 Months

A Texas man found guilty of hacking and abusing the LASC network for sending phishing emails was sentenced to a federal prison this week. The man, Oriyomi Sadiq Aloba, 33,…

Read More
likely technology trends 2018

Micro Fixes Vulnerability in an Anti-Threat Toolkit

Trend Micro recently patched its Anti-Threat Toolkit (ATTK) for a high-grade remote software execution vulnerability. The Trend Micro ATTK tool lets users scan their system and perform clean rootkit, ransomware,…

Read More

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password

Register