Security News

Serious Vulnerabilities Detected in the WPA3 Protocol 1

Serious Vulnerabilities Detected in the WPA3 Protocol

Almost one year after its launch, some very serious vulnerabilities that could lead to online password cracking have been detected in the next-generation Wi-Fi security standard WPA3. It was in…

Read More
Global Threat Statistics 1

Global Threat Statistics for the week of March 22, 2019

PayPal Phishing Casts a Wide Net One of the most successful phishing methods is to co-opt a well-respected brand. PayPal topped the list by a wide margin in a recent…

Read More
Open EDR
Microsoft Releases First Preview Builds of Edge Browser 2

Microsoft Releases First Preview Builds of Edge Browser

Microsoft has released the first preview builds of its Chromium-based Edge browser. The release of the first Canary and Developer builds, which would be available for download on Windows 10…

Read More
7 Step Guidelines Released By EU For Trustworthy AI 1

7 Step Guidelines Released By EU For Trustworthy AI

No technology raises the outright fear like artificial intelligence. And this is not something that worries the ordinary people. Google and Facebook, have done some thorough research in AI ethics…

Read More
Geoscience Australia Highly Vulnerable to Cyber Attack min

68% of Firms, Moderate to Extremely Vulnerable To Internal Threats

With malware infestation, data breaches allegedly caused by state-funded actors and phishing attacks becoming headlines in both mainstream media and tech news sites, it is still not the main cause…

Read More
phishing attacks

Things To Do To Defend Against Spear Phishing

  Phishing is a way to extract confidential data from individuals and businesses. Mostly by creating fake Web pages or send emails to disclose login names, passwords, credit card information,…

Read More
Hacker Group Has Been Hacking DNS Traffic on D Link Routers

Hacker Group Has Been Hacking DNS Traffic on D-Link Routers

Earlier, we had service provider playing tricks with your DNS traffic. Then, it was difficult for us to fathom unless you are an expert to figure this out. Well, the…

Read More
Google Releases Android Q Beta 2 Bubbles Feature a Highlight

Google Releases Android Q Beta 2, Bubbles Feature a Highlight

Google has released Android Q Beta 2, which comes with a set of new features. Google announced, on April 3, 2019, the release of the second beta of Android Q,…

Read More
The IT Acronyms and What They Stand For

The IT Acronyms and What They Stand For

Here are the IT Security acronyms that you will like to know what it stands for in technology world. IT Security A measure that help organizations to verify that their…

Read More
WordPress Login Bug 2

WordPress Login Bug, Enables Third-Parties To Receive Security Tokens

The use of a Content Management System (CMS) to manage websites is heaven sent for non-programmers. The ease of use through a WYSIWYG editor it provides is like publishing a…

Read More

Page 27 of 87

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register