Today's Featured

Latest Security News

Android Antimalware Apps You Can Install Today

High-risk consumers are conscious that criminals are more likely than the mainstream, but many of them still have poor security behaviors, a Google survey shows. High-risk user groups involve executives,…

Read More
windows-7

If your business is still running on Windows 7, it is time to take the end of January 14, 2020 seriously. Here are the four options. If your company still…

Read More
prison

The brute-force account cracking tool of Sentry MBA has been used to compromise user accounts. For nine months, an individual who was interested in a hack into the British National…

Read More
Citrix servers

At least eighty thousand organisations could be at risk. Cyber attackers scan Citrix servers, which are vulnerable to a critical ADC and Gateway security vulnerability, as researchers have warned.  Disclosed…

Read More
Understanding Indicators of Compromise to Improve Your Cybersecurity

Vendors are allowed to have 90 days to fix bugs, under adjustments to the transparency policies of Google Project Zero. Project Zero, the team of elite security researchers from Google,…

Read More
The Messaging App WeChat Exceeds 1 Billion User Account

A malicious code exploited a newly fixed zero-day flaw in the Google Play store that affects multiple Android devices, including Pixel phones from Google. Tracked as CVE-2019-2215, Google Project Zero…

Read More
Kent County Community Mental Health Hit By Phishing Attack

New York Special Olympics has been compromised, a non-profit organization focusing on competitive athletes with mental handicaps. New York Special Olympics presents equal opportunity to participate in Competitive, organized sports…

Read More
NoKor Hackers Behind Latest Round Of Spearphishing

On Friday, a British citizen was convicted for trying to bribe Apple by alleging that he had a massive iCloud folder and other Apple accounts. The guy, 22-year-old Kerem Albayrak…

Read More
SSL Traffic

Apparently, without even decrypting it, DNS-over-HTTPS (DoH) traffic can be detected, a security researcher has discovered. The aim of the DoH protocol is to improve the overall Internet security by…

Read More
A Look at the Biggest Ransomware Attacks 2017

As if it wasn’t hard enough to have their data compromised, businesses who fell victim to Maze ransomware are now facing another threat: their data could become public. Maze’s operators…

Read More
Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register