Reports reveal that user payment data was stolen from many local Click2Gov government systems across US cities. There were rumors surfacing last year itself that the local government portal service…
Read More
Reports reveal that user payment data was stolen from many local Click2Gov government systems across US cities. There were rumors surfacing last year itself that the local government portal service…
Read More
Personal information for sale? A lot of those ‘merchandise’ are available in the Deep web today. The deep web is the part of the Internet that is not indexed by…
Read More

The practice of counter-hacking is very important for companies today, as they spend for research and development, funding for ways to be a step ahead from the hackers will help…
Read More
A new Google+ bug that has probably hit the accounts of about 52.5 million users has made Google think of shutting down the service earlier than scheduled. Google had announced…
Read More
As reported by SC Magazine, a U.K./Nigerian cybergang has accumulated a list of more than 50,000 corporate executives to be targeted in future phishing campaigns. According to Agari’s London Blue…
Read More
This may sound strange, and to an extent startling as well. A hacker could steal data from your system (which would already have a malware in it) by just sending…
Read More
The Cybersecurity-related profession is a very dynamic, too dynamic in fact that many in the industry are not formally educated to become a future member of the sector. The reality…
Read More
Singapore is above average when it comes to the risks of being targeted by cyber attacks, that is the disclosure published in the recently released cyberexposureindex survey, as it measures…
Read More
HP New Zealand IT Security has publicly revealed that 45% of New Zealand’s companies are not ready to face the security challenges, as they are using ineffective endpoint protection software,…
Read More
Phishing attacks anchor itself by its two strong instruments: Pretending to be from a popular brand The clever presentation making its message believable Without these two aspects, phishing attempts will…
Read More