More Information about July 2018’s Singapore SingHealth Data Breach Revealed

More Information about July 2018’s Singapore SingHealth Data Breach Revealed

Last July, we have reported the SingHealth Singapore’s massive data breach, in fact, the biggest security breach in the city-state’s history. The investigation continued for a quarter, with a shocking…

Read More
The Importance of Application Security Approach in Today’s Computing

The Importance of Application Security Approach in Today’s Computing

Application security testing was not a vital part of software development in the early days of computing. In those early days, the most important factor was that the developers meet…

Read More
Open EDR
Blackberry In the IoT Security Game

Blackberry In the IoT Security Game

The Blackberry has lost the smartphone game, in fact, they are trying to rebuild their smartphone using Android for at least a couple of years now. But the used to…

Read More
The LibSSH Security Bug in the Nutshell 1

The LibSSH Security Bug in the Nutshell

Libssh, the direct competitor of OpenSSL has been disclosed of having a critical security flaw in its SSH protocol. A hidden backdoor was recently discovered that enable successful remote connection…

Read More
The Prospects of Commercializing Homeland Security Technologies

The Prospects of Commercializing Homeland Security Technologies

The amount of research that the U.S Department of Homeland Security puts in for combating cybercrimes is stupendous. This research leads to developing technology that’s used in turn to develop…

Read More
Securities Market at Huge Risks Probable Target

Securities Market at Huge Risks, Probable Target

Right after the chain of hacks targeting cryptocurrency exchanges, hackers are setting their sight on a new, equally lucrative target: the securities market. The securities market is composed of trading…

Read More
Status of Today’s Email as a Malware Vector

Status of Today’s Email as a Malware Vector

Email has been in use since 1971, as developed by Ray Tomlinson, the person responsible with defining the “@” symbol that separates the domain name from the user’s email name….

Read More
Anthem to Pay Record 16M as Settlement for Privacy Violations

Anthem to Pay Record $16M as Settlement for Privacy Violations

The Anthem settlement is nearly three times larger than the previous highest amount paid to the government in a privacy case. In other health industry news: telemedicine fraud, tariffs, and healthcare construction,…

Read More
TOP 10 PHP Vulnerability Scanners

TOP 10 PHP Vulnerability Scanners

In today’s world, automation is the name of the game. People expect a faster way to do the job, to meet deadlines and settle obligations. Same goes with the security…

Read More
Deloitte Cyber Attack Reported High Profile Blue Chip Clients Could be Affected 1 1

UN Sensitive Information Exposed Publicly Due to Neglected Security Settings

Of all the many troublesome episodes on the Internet, it usually boils down to one common weakness, human error. Even the United Nations is not spared when it comes to…

Read More

Page 4 of 9

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register