Author Details


 This morning a message popped up in my Facebook messenger from a friend that read: “Please tell all the...

Read More
Cyber Awareness

Cyber awareness has to be implemented to enhance cyber hygiene. Users have become accustomed to spending lots of time...

Read More
Exploits Google Flaw

Malware is dangerous. Cyber criminals are now targeting all types of operating systems – Windows, Linux, iOS, and Android....

Read More
Linux Malware Safeguard

There was a time when people thought Linux devices were immune to malware. But last year’s Mirai botnet attacks,...

Read More
Mac Malware

Two new strains of Mac malware are making the rounds, as per recent reports. They are being offered through...

Read More

It has been almost a week since the NotPetya malware outbreak has happened. The malware, which hit Ukraine and...

Read More
EU Slapped Google with Largest antitrust penalty

The search engine giant Google suffered a major blow after European Commission found them in unfair trade practice. On...

Read More

On Tuesday, a ransomware called “Petya” or “Petrwrap” struck organizations and companies across the world in a series of...

Read More
Virtual reality

In the past, we thought of technology addiction as something caused only by chemical substances—nicotine, cocaine, heroin, etc. Today, we...

Read More
vulnerable attack

Researchers discovered yet another IoT botnet. Researchers at Trend Micro found that 120,000 Internet Protocol (IP) cameras are vulnerable to attack....

Read More

Page 68 of 70


Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password