The Technology That Prevent becoming a victim of Email Spoofing

The Technology That Prevent Becoming a Victim of Email Spoofing

Domain-based Message Authentication, Reporting and Conformance (DMARC) is an anti email spoofing technology first drafted in 2012 to help address the issues of fake and phishing email messages. The system…

Read More
visa 3082813 1280

The Rise of Mobile Payments and the Technology Keeping Them Secure

If the growth of the internet has transformed one aspect of our lives more than any other in recent years, it is the way in which we interact with money….

Read More
Open EDR
Text based reCaptcha Defeated By An AI

Text-based reCaptcha, Defeated By An AI Bot

Anyone who browses the web is very familiar with the anti-robot technology we call CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart), that blocks everyone to…

Read More
Practical Policies That Help Increase Corporate Security

Practical Policies That Help Increase Corporate Security

Companies today have largely accepted that technology is here to stay, and not embracing it is not in the table. The white flag has been raised, even for the strict…

Read More
Dell Discovers Breach Resets Customer Passwords

Dell Discovers Breach, Resets Customer Passwords

Dell Inc, after discovering a breach impacting customer data, has reset passwords for all accounts on its Dell.com online electronics store. It was on November 9 that the computer maker…

Read More
Women Empowerment in Technology and IT Security Pushed

Women Empowerment in Technology and IT Security Pushed

Women in technology is a force to recon with, as it is one of the most gender-neutral industries on a global scale. This has been the message echoed in the…

Read More
Patient’s life is at risk as pacemakers are vulnerable to cyber attack

DJI Drone Vulnerability Due to DJI Forum’s Weakness, Patched by its Vendor

Just like personal computers, smartphones and tablets, new smart devices such as the highly viral remote quadcopters (AKA drones) are powered by an operating system. As part of the territory,…

Read More
Your Network Hardware Maybe Aiding Spies Right Now

Your Network Hardware Maybe Aiding Spies Right Now

Yes, really. Your government or a foreign spy agency might be tuning in right now through your router or your server equipment. Two Cases of Hardware Tampering In 2015, Amazon…

Read More
How Google Engineers Protect Politicians during the Election

How Google Engineers Protect Politicians during the Election

As reported in the business insider. In the past few years, there has been an increase in targeted hijacking towards the online accounts of politicians and other high-profile figures. In…

Read More
Removal Storage USB Drives Serious Security Threats Report

Removal Storage, USB Drives Serious Security Threats: Report

Removal storage and USB thumb drives are serious security threats and could cause massive damage to industrial systems, as per a new report. A new, first-of-its-kind research report released on…

Read More

Page 4 of 7

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register