Security News

WhatsApp Launches Service to Fight Fake News in India 1

WhatsApp Launches Service to Fight Fake News in India

As an extension to its fight against fake news, WhatsApp has launched a service in India to fight fake news. This gains relevance as India is all set to go…

Read More
Linux Lite 4.4 Officially Released 1

Linux Lite 4.4 Officially Released

Linux Lite 4.4, the latest version of Linux Lite, has been officially released and is now available for download and installation. As we know, Linux Lite is a lightweight Linux…

Read More
Open EDR
Game of Thrones Downloads Widely Used to Spread Malware 1

Game of Thrones Downloads Widely Used to Spread Malware

Game of Thrones downloads seem to be favored greatly for spreading Windows malware, according to a new report. In a recent report, security firm Kaspersky Lab says, based on data…

Read More
Basics Of Security Drupal CMS

The Basics Of Security Drupal CMS

Drupal is considered as a professional-level Content Management System (CMS), with advanced features than Joomla, WordPress, Sharepoint, and Magento. Just like other software, it requires updates and careful maintenance of…

Read More
Australia Doesnt Want Huawei and ZTE to Supply Technology for 5G Networks

EU’s G5 Technology Roll-out In The Age Of Anti-Huawei Publicity

As the world is anticipating with the roll-out of 5G technology, which is promising to change how we deal with the mobile Internet, the intensity of Anti-Huawei propaganda has reached…

Read More
The Technology Called Runtime Application Self Protection RASP

The Technology Called Runtime Application Self-Protection (RASP)

A security technology that is built on or linked into an application runtime environment, and is capable of controlling application execution, and detecting and preventing real-time attacks,” This is how…

Read More
Penetration Testing Most Visible Component of Cyber Security

Penetration Testing The Most Visible Component of Cyber Security

Amid all of the high-profile data breaches, of all sizes have been successfully targeted by hackers who employ a wide range of different strategies. Companies have had to learn about…

Read More
Threat Intelligence With 2 Most Used Operating Systems

Threat Intelligence With Two Most Used Operating Systems

With 4.312 billion users in the world, comprising 55.6% of the global population, the Internet has become an everyday center hub for almost all human events and actions. Be it…

Read More
8 Easy Steps of Installing Kali Linux In Raspberry Pi

8 Easy Steps of Installing Kali Linux In Raspberry Pi

The humble Raspberry Pi, a single-board integrated computer based-on ARM architecture has become very influential in the field of enthusiast computing. With specifications akin to a smartphone of 2011: Raspberry…

Read More
Commonwealth Floats Increased Penalties For Privacy Breaches 1

Commonwealth Floats Increased Penalties For Privacy Breaches

It was in November, 2012, when the first time The Australian Privacy Commissioner announced that under a new law, it will be able to issue million-dollar fines to government agencies,…

Read More

Page 28 of 87

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register