Author Details

Scam in Chrome

Now here comes the latest where cybercriminals are abusing web browser code to create windows that prevent users from closing it,...

Read More
Cyber Attacks

Do you understand what is a real cyber attack and how to prepare yourself in case it happens? Every...

Read More
Penetration Testing

A penetration test, or pen-test, is an effort to measure the security of an IT infrastructure by safely attempting...

Read More
Crypto-Miners Attack

More than 4000 government websites across the world has been attacked yet again, and this time again it’s the new player...

Read More
Ransomware Attack Last Year

Almost 54 percent of organizations had suffered a ransomware attack in the last one year, as per a recent...

Read More
Google's Android Security

In the first week of every month, Google releases the monthly Android security patch for Nexus and Pixel devices....

Read More
Cybersecurity at NHS

Every NHS trust assessed for cybersecurity vulnerabilities has failed to meet the standard required, civil servants have said for the first...

Read More
First Kotlin-Based Malware

Cyber security researchers have reportedly discovered what they think is the first Krotin-based malware affecting the Android OS. The...

Read More
pos vulnerability

POS (Point-of-Sale) systems are always among the favorite targets of hackers; POS terminals always provide them the chance to...

Read More
technology trends

The Elon Musk’s giant solar battery in South Australia comes in as an exciting technology, and this was followed...

Read More

Page 59 of 76

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register