Author Details

Loapi Malware

A new malware that has the capacity to mine cryptocurrency launched DDoS attacks that after two days of testing...

Read More
Healthcare Data Breaches

Many leading healthcare organizations have been targeted and attacked by cyber criminals in the last few years. One of...

Read More
cyber attack

77 percent of companies worldwide were hit by some kind of the cyber attack during the past year, says...

Read More
Security App

Cisco’s new iOS 11 will give comprehensive protection over network activity to prevent users getting attacked from Ransomware and...

Read More
Mobile Security

Mobile Security is now an integral part of enterprise security. Mobile malware has become a thing to reckon with...

Read More
Web Application Penetration Testing Checklist Overview

Penetration testing is the process of testing a software by trained security experts (aka penetration testers or ethical hackers)...

Read More
Vulnerability in Intel Chip

Intel the giant in chip making is in the news for all the wrong reason. It has been reported...

Read More
vulnerabilities

Apple had to rush in to make a quick update on serious vulnerabilities in macOS. The vulnerability hole was...

Read More
Ethiopia Malware Attacks

Ethiopia continues to carry out targeted malware attacks on dissidents and activists located in other countries, according to the...

Read More
Virtual Keyboard App

A popular virtual keyboard app has caused leakage of personal data belonging to over 31 million customers. This data...

Read More

Page 70 of 83

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register