Today's Featured

Latest Security News

Adwind Spyware-as - a-Service Utility Grid Operators Attacks

A phishing campaign for grid operators uses a PDF attachment to offer spyware. A campaign aimed at a domestic grid infrastructure that spoofs a PDF attachment to deliver Adwind spyware….

Read More
What Is Deep Packet Inspection and How Does It Work

Also known as DPI, deep packet inspection is a kind of packet filtering that evaluates the data and header of a packet that is transmitted through an inspection unit to…

Read More
Difference Between Data at Rest and Data in Transit

When data is actively moving from one location to another either via the internet or a private network, this is known as data in transit, or data in motion. At…

Read More
After hacking, data theft, European Central Bank closes its website

On Thursday, the European Central Bank (ECB) confirmed that the BIRD’s Web site was affected by attackers and downsized until the situation was under control. This compromise may have resulted…

Read More
New Ransomware Attack – Texas Government agencies become Victim

Still, Ransomware attacks become a problem on local governments, and Texas discovers this first-hand. On the morning of August 16, 23 government entities reported a ransomware attack. Most were “smaller…

Read More
Polymorphic Refers to a Malware’s Ability to Change

When it comes to malicious programs, polymorphic refers to a malware’s ability to change itself and its identifiable features in order to avoid detection. Many types of malware can take…

Read More
Why Companies Need Endpoint Protection

Endpoint protection, also known as endpoint security, is a security solution that addresses malicious cyber-attacks from endpoint devices, such as zero-day exploits, inadvertent data leaks that result from human error,…

Read More
Blinking Red Light of Death for Cameras

Cameras you can find on street corners, offices, and public spaces can all be used by attackers in one way or another in order to steal sensitive information. Researchers from…

Read More
Understanding What Is Malware Analysis

What is malware analysis? This is the process involved in studying and learning how a particular malware works and what it can do. Their code can differ radically from one…

Read More
KNOB Security Flaw Exploits All Versions Of Bluetooth Devices

There are times when technology becomes too ubiquitous and too accessible by the public for its own good, it becomes a favorite target of cybercriminals. Discovery of vulnerability by security…

Read More

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password