Latest Security News

Google Acknowledges Having Android Backdoor Triada
Latest Security News

Google Acknowledges Having Android Backdoor Triada

On June 6, 2019, Google released a case study of very intelligent hackers who were trying to plant backdoor in Android phones. This is about a family of apps called…

Read More
What Is a Rootkit Detection and Prevention
Latest Security News

What Is a Rootkit? Detection and Prevention

Rootkits are secret computer programs that allow continuous and privileged access to a computer and actively hide its existence. The term rootkit is the combination of the two words “root”…

Read More
Spear-Phishing How to Protect Yourself From an Attack
Phishing Attacks

Spear-Phishing: How to Protect Yourself From an Attack

Spear-Phishing Even with the number of messaging apps available now, companies still use email. On average, a person receives over a hundred emails a day from bosses and companies. Because…

Read More
Digital Transformation and Implementation of Information Security
Latest Security News

Digital Transformation and Implementation of Information Security

Security has been a major concern for everyone recently, especially for companies that use technology as the main component of their service offering. The increasing pressure of consumer expectations is…

Read More
Understanding the Difference of Multi-tenant SaaS
Tech

Understanding the Difference of Multi-tenant SaaS

Why would you consider using a multi-tenant SaaS? What are its advantages? In the earlier days of the cloud, companies were hesitant in using this new technology. There were a…

Read More
What is Data Exfiltration and How to Prevent
Latest Security News

What is Data Exfiltration and How to Prevent

Defining Data Exfiltration Also referred to as data theft or exportation, data exfiltration is when an unauthorized transfer of data occurs from one device to another. This can be done…

Read More
How SOCaaS Evolves Corporate Security Infrastructure
Latest Security News

How SOCaaS Evolves Corporate Security Infrastructure?

Last month, June 9, 2019 we featured here in Hackercombat.com an article providing a quick glimpse of what a Security Operation Center (SOC) is all about. If we can make…

Read More
Overview Of Vulnerability Management
Vulnerability

Overview Of Vulnerability Management

As we discuss more and more stories about vulnerabilities everyday here in Hackercombat.com, we need to empower you – our readers of the basics of vulnerability management. Programs are flawed…

Read More
Email Remains The Biggest Vulnerability
Phishing Attacks

Email Remains The Biggest Vulnerability, According To A Survey

Ever since email came into existence in the 1990s and the high level of awareness of the risks involved, 94% of the organizations surveyed said that it was still a…

Read More
Japan's 7-Eleven Store Customers lose ¥55 million
Latest Security News

Japan’s 7-Eleven Store Customers lose ¥55 million

The operator of Seven-Eleven store operators in Japan said Thursday that some 900 customers using their mobile payment services could lose 55 million yen (the US $ 510,000) due to…

Read More

Page 1 of 72

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register