cybersecurity

Zimbabwe’s Struggle for Better CyberSecurity Defense Improved with Japan’s Aid

Zimbabwe’s Struggle for Better CyberSecurity Defense, Improved with Japan’s Aid

It is fairly common for a first world country to extend its foreign aid to a 3rd world nation, especially in the sectors of food security, education, and infrastructure funding….

Read More
On Mid 2019 No Facebook Messenger P2P Service For UK and France

Massive Crackdown Against Fake Accounts: Facebook Deleted 1.5 Billion Accounts

The social media giant, Facebook has heightened its fight against pretenders and fake accounts in its pursue its commitment with the government. They have released an official report, summarizing their…

Read More
Open EDR
StarHub Relies the Most on Enterprise for Growth

StarHub Relies the Most on Enterprise for Growth

The Singaporean telecommunications carrier StarHub seems to be relying the most on enterprise for its growth, as per a report published by the company. StarHub recently came out with its…

Read More
new

Artificial Intelligence as the Next Host of Cyber Attacks, a Cybersecurity Research Firm Revealed

Artificial Intelligence is still crude as of this time, but it has already become both a blessing and a curse to the world. Through AI, companies, large and small, for-profit…

Read More
How Google Engineers Protect Politicians during the Election

How Google Engineers Protect Politicians during the Election

As reported in the business insider. In the past few years, there has been an increase in targeted hijacking towards the online accounts of politicians and other high-profile figures. In…

Read More
Man Vs. Machines Employing Artificial Intelligence in Cybersecurity

Man Vs. Machines: Employing Artificial Intelligence in Cybersecurity

As the market of (AI) is thriving, and how technology people are elevated with its flexibility, various new businesses and Internet giants are racing to make it a part of…

Read More
Recipe for disaster Bluetooth enabled POS Terminals MagStripe based Cards

Recipe for disaster: Bluetooth-enabled POS Terminals + MagStripe-based Cards

These days convenience is proportional to security; it can never be convenient if strict security protocols are in-place and vice-versa. As people tend to embrace the cashless way of paying…

Read More
The LibSSH Security Bug in the Nutshell 1

The LibSSH Security Bug in the Nutshell

Libssh, the direct competitor of OpenSSL has been disclosed of having a critical security flaw in its SSH protocol. A hidden backdoor was recently discovered that enable successful remote connection…

Read More
Facebook to Acquire Cybersecurity Company

Facebook to Acquire Cybersecurity Company

Facebook wants its users to know that they are serious about security and are beefing up security after the recent report of security breach. Looks like the social media giant…

Read More
Maritime Cyber Threat Growing Warn Security Experts

Maritime Cyber Threat Growing, Warn Security Experts

Maritime industry across the world should do more to protect their firms against the increasing cyber-attacks. This was reiterated by experts during the recent event at the opening of maritime…

Read More

Page 13 of 16

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register