Cybersecurity is a practice that ensures that all the information, confidentiality and availability are intact and not compromised with. It depends on how you keep them safe and in case…
Read More
Cybersecurity is a practice that ensures that all the information, confidentiality and availability are intact and not compromised with. It depends on how you keep them safe and in case…
Read More
The year 2017 was quite exciting as we came across several new things from Ransomware to IoT malware and more. Several industries found themselves gripped at the mercy of the…
Read More

A new, invasive Mac malware, a new version of the OSX.Pirrit adware, has been discovered by security researchers. This variant of OSX.Pirrit, as per the security experts, helps hackers gain…
Read More
Cisco’s new iOS 11 will give comprehensive protection over network activity to prevent users getting attacked from Ransomware and malware. Cisco and Apple have come together to protect the iOS…
Read More
Mobile Security is now an integral part of enterprise security. Mobile malware has become a thing to reckon with for individuals as well as for enterprises big and small. With…
Read More
Spider is the new ransomware that is targeting the victims located in the Balkans in what is called a “mid-scale” campaign. The Spider ransomware is unique in that attackers are…
Read More
Android malware is a big reality now; it’s increasingly becoming a part of our day to day existence. With Android devices getting immensely popular, security threats to Android devices too…
Read More
Just when the Apple released 11.1 as a patch to address the crack in WiFi and other exploits, here comes the news that it has been hacked again. It was…
Read More
Hackers are now using a cheap, nasty malware- the FormBook malware- to carry out a series of campaigns targeting defense, aerospace and manufacturing contractors in the US and South Korea,…
Read More
Major professional services firm Deloitte has been targeted by a cyber security attack and reports say that the attack could have led to the breach of the confidential emails and…
Read More