Latest Security News

Vulnerabilities in PGP and SMIME Will Leak Emails in Plain Text
Vulnerability

Vulnerabilities in PGP and SMIME Will Leak Emails in Plain Text

Pretty Good Privacy (PGP) and S/MIME Email encryption are affecting the users and it has been found that a new set of vulnerabilities is affecting the users. This encryption is widely…

Read More
Newly Found Vulnerabilties Start to Disadvantage Microsoft Software
Vulnerability

Newly Found Vulnerabilties Start to Disadvantage Microsoft Software

The researchers found out that Microsoft’s Edge and Internet Explorer browsers, as well as its Office, Exchange, and Outlook software to the vulnerable software. The ‘use after free’ vulnerability is…

Read More
The Different Phases of a Cyber Attack
Cyber Crime

The Different Phases of a Cyber Attack

As we begin to discuss the different phases of a cyber attack, let’s not forget that things are changing drastically as regards the cyber security industry. Hacks today are being…

Read More
Microsoft 365 Boost Your Business Productivity
Phishing Attacks Ransomware

Microsoft 365 Business Boosts SMB Security for PC Protection

The Microsoft 365 Business suite has come up with some security enhancements designed to boost SMBs and their data. Microsoft recently added some new tools to its Microsoft 365 software…

Read More
Protect Your Twitter Account
Hacks Latest Security News

Secure Your Twitter Account and Protect it From Being Hacked

After the Facebook data scandal, people have turned very cautious as regards protecting their personal data online. Twitter, it should be remembered, was also named as one of the companies…

Read More
Now, Google's AI to Book Your Appointment Over The Phone
Latest Security News

Now, Google’s AI to Book Your Appointment Over The Phone

Guess what, Google’s Assistant AI is getting smarter by the day. Ask it about the weather and you will get the answer, or if that matters ask it to crack…

Read More
Cyber Criminals
Cyber Crime

How Cyber Criminals Attempt Cashing in on Cryptocurrency

Cyber criminals all the world over today show an increasing trend to illicitly generate cryptocurrency through mining; they’d steal currencies from exchanges and wallets and would devise new ways of…

Read More
Proactive or Reactive, Which is the Better Method for DDoS Defence
Cyber Crime Data Protection

Proactive or Reactive, Which is the Better Method for DDoS Defence?

DDoS attacks are now widespread; there happen many DDoS attacks targeting enterprises all the world over. In fact, in the recent past, there have been many massive DDoS attacks and…

Read More
Web Security

Top 10 Torrent Alternatives You Can Use Right Now

The Pirate Bay (TPB) is the king of torrent download websites; however, there has been an increase in its server downtime as of late. Its space on the darknet has…

Read More
Google Accounts to Prevent Phishing Attacks
Phishing Attacks

New Google Verification Feature Made to Prevent Phishing Attacks

Google has announced, for Google accounts, a new feature that would help successfully combat phishing attacks. In an update dated 25th April on its G Suite blog, Google had announced…

Read More

Page 48 of 69

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register