Security

Mobile Security
5 Easy Ways to Secure a Mobile User

5 Easy Ways to Secure a Mobile User

Google’s Android 9 Pie the new Android

Google’s Android 9 Pie the new Android

Android Auto in 630 words

Everything You Wanted To Know About Android Auto And More

Apple’s iOS 12 is all about Security

Apple’s iOS 12 is all about Security

Page 9 of 17

Android Security
Leaks
computer girl

novoShield Emerges From Stealth With Mobile Phishing Protection App

Geoscience Australia Highly Vulnerable to Cyber Attack min

FBI Issues Warning About Increase in Attacks Against DeFi Platforms

Geoscience Australia Highly Vulnerable to Cyber Attack min

Security Firm Discloses CrowdStrike Issue After ‘Ridiculous Disclosure Process’

DDoS Attackers

Ring Android app flaw allowed access to camera recordings

Page 9 of 30

GDPR
Cryptocurrency
Using BitCoins The Basics

Using BitCoins: The Basics

North Korean Hackers Stole 571 Million Worth of CryptoCoins

North Korean Hackers Stole $571 Million Worth of CryptoCoins in Less Than 24 Months

Fake Flash Player Installer Embeds Monero Coin Miner Wreaking Havoc in the Wild

Fake Flash Player Installer Embeds Monero Coin Miner, Wreaking Havoc in the Wild

Crypto Mining Malware Runs on iPhone

Crypto Mining Malware Runs on iPhone

Page 9 of 10

DDoS
Infographics
All Security News
Cases of Cyber Attacks in Kenya Rise to 11.2 million

Norwegian Media Behemoth is the Latest Victim of Cybercrime

Amedia, a Norwegian print house, is the latest victim of cyberattacks that the company has termed an apparent “severe” cyberattack. The attack took place in the wee hours of Monday…

Read More
mobile app

Alibaba Punished By The Chinese Government For Failing To Tell It About The Log4Shell Flaw First

The ministry of information technology in China has opted to pull back from its collaboration with Alibaba temporarily. The ministry deals with industry and issues involving IT and has collaborated…

Read More
The Importance of Application Security Approach in Today’s Computing

SAP Addresses Log4Shell Vulnerability Patching in 20 Applications

Well over three billion devices run on Java worldwide. However, logging libraries are few, which is why many of the devices are most likely to run the popular logging framework,…

Read More
Open EDR
What went wrong The Banco de Espana DDoS Attack

Ransomware, Trojans, DDoS Malware and Crypto-Miners Delivered in Log4Shell Attacks

Every single day, hundreds of thousands of internet users are victims of some form of cyberattack. The number of hackers is daily growing and so are their strategies. The different…

Read More
Microsoft Warns Users About Ongoing Email Spam Campaign

Microsoft’s Loop Project Management Software

Microsoft has been developing a project collaboration solution for enterprise projects. The Loop app is now accessible to Microsoft 365 commercial customers.  The Loop app is an independent software on…

Read More

Warning: Cyberattacks Are on The Rise! IKEA’S Emailing Compromised

Phishing is an email or SMS from an imposter pretending to be from a legitimate brand to induce people to hand over private information, passwords, and financial card details. It…

Read More
A Cyber Attack Costs Average 10.3 Million Too Big for SMEs

The Government of Taiwan Faces 5 Million Cyber Threats Daily

A report from government agencies in Taiwan indicates that the country faces over five million cyber probes and attacks daily. The report also warned of the rising Chinese cyber warfare,…

Read More
Cases of Cyber Attacks in Kenya Rise to 11.2 million

Rise In Cyberattacks As Taiwan Government Faces Over 5 Million Cyberattacks Daily

Government agencies in Taiwan have been facing frequent cyber attacks. The island faces multiple threats daily, in the form of cyberattacks and probes. With attacks coming in the millions the…

Read More

Google Advisory on Android Security Updates

Defining zero-day A zero-day (0day) vulnerability is a security flaw for which there is no mitigation or fixes available at the time of press release or publication. Existing software fixes…

Read More

Adobe Fixes Gaping Vulnerability Glitches in 14 Software Products

Adobe recently released a collection of emergency patches with remedies for over 90 tabulated vulnerabilities that endanger Linux, macOS, and Windows users, exposing them to cruel cybercriminal attacks. The security…

Read More
Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register