Author Details

Google Faces Lawsuit Accused of Tracking Locations Even When Location History is Off

A lawsuit has been filed against tech giant Google, accusing Google of tracking locations even when the “Location History”...

Read More
How to Read Others’ Facebook Messages Without Them Knowing

Facebook is today an integral part of our day-to-day life; millions of people across the world use Facebook daily...

Read More
Minnesota Man Charged for Employing ‘Hacker for hire’ to Target Local Business Website

A report conducted by Shape Security has revealed that 90% of e-commerce login traffic comes from hackers, which once...

Read More
Security Researchers Uncover Dark Tequila Banking Malware After 5 Years of Activity

Kaspersky Lab researchers have discovered Dark Tequila, a new, complex malware campaign that has been targeting users, especially bank...

Read More
Virtual Patching vs Unpatched Vulnerabilities Unleashed by Trend Micro

Trend Micro is introducing a new update on how its software implements automatic updates, they dubbed it “Virtual Patching”....

Read More
Skype Gives Communication Security a Boost with End to End Encryption 1

The new Skype 8.0 has been fully redesigned and will replace its predecessor, version 7.0, which will cease to...

Read More
Understanding Business Intelligence and Data Security 1

The Australian Cyber Security Centre has now got its own office; the Centre has shifted base to its new...

Read More
India’s Cosmos Cooperative Bank in Hot Water Online Bank Theft from 28 Locations Recorded

The NPCI (National Payments Corporation of India) has blamed the Cosmos Cooperative Bank for the ₹94.42 Crore theft due...

Read More
Routers and Internet of Things Most Attacked

Microsoft, Apple, and Linux developers for decades have tried their very best to harden their operating system from security...

Read More
Microsoft Cortana Vulnerability Allows Unauthorized Browsing on Locked Devices

Researchers have detected a privilege escalation vulnerability with Cortana that allows hackers to gain physical access and do unauthorized...

Read More

Page 64 of 97

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register