According to Check Point’s latest Global Threat Impact index, nearly 23 percent of organizations across the world is affected by the Coinhive – the Crypto-mining malware that drains CPU power…
Read MoreAccording to Check Point’s latest Global Threat Impact index, nearly 23 percent of organizations across the world is affected by the Coinhive – the Crypto-mining malware that drains CPU power…
Read MoreSecurity researcher Scott Helme discovered a third party accessibility plugin called ‘Browsealoud’. In the past 24 hours, it was found that several browsers were compromised. The plugin hides on the…
Read MoreNow here comes the latest where cybercriminals are abusing web browser code to create windows that prevent users from closing it, this is the latest finding from security company Malwarebytes. This is…
Read MoreDo you understand what is a real cyber attack and how to prepare yourself in case it happens? Every day cyber attacks are rapidly spreading all over the world, growing…
Read MoreA penetration test, or pen-test, is an effort to measure the security of an IT infrastructure by safely attempting to exploit vulnerabilities. These vulnerabilities may exist in OSs, services, and…
Read MoreMore than 4000 government websites across the world has been attacked yet again, and this time again it’s the new player Cryptocurrency. The strain of malicious malware has made its way, as…
Read MoreIn the first week of every month, Google releases the monthly Android security patch for Nexus and Pixel devices. And, sticking to its monthly schedule, Google has released the Android…
Read MoreEvery NHS trust assessed for cybersecurity vulnerabilities has failed to meet the standard required, civil servants have said for the first time. It was the first time that the NHS came out with…
Read MoreCyber security researchers have reportedly discovered what they think is the first Krotin-based malware affecting the Android OS. The discovery has been made by researchers at Trend Micro; a Trend…
Read More