Security

Android Security
GDPR
Cryptocurrency

Page 10 of 10

DDoS
Infographics
All Security News
rami al zayat w33 zg dNL4 unsplash

T-Mobile Acknowledges Breach of Customer Data, Launches Probe

In a statement dated August 16, 2021, T-mobile confirmed allegations that their servers had indeed been hacked. They insisted, however, that preliminary investigations have not established if the hackers managed…

Read More
Australia’s TGA Medical Devices Cybersecurity Guidelines

Researchers Perform An Analysis on Chinese Malware Used Against Russian Government

Security researchers from the threat hunting and intelligence company Group-IB have revealed that in 2020, at least two espionage groups from China targeted the Russian Federal authorities. Chinese espionage groups…

Read More
A Guide to Cyber Security Salary

Security Experts Tie Covert Wiper Tool to Iranian Railway Infrastructure Hacking Attempt

Security experts at SentinelOne have come across a previously unidentified data-scrubbing malware tool that was a portion of an uncontrollable malware attack against Iran’s railway infrastructure earlier this month. With…

Read More
Open EDR
Google’s Advanced Protection Program For Cloud Services Released As Beta

Google Explains New Safety and Privacy Guidelines for Android Apps

This week Google announced several upgrades to the rules that govern the Play Store which are intended to enhance the general user safety and privacy and give more control to…

Read More
Ransomware Attack Against Wolverine Solutions Group

Popular Fashion Seller Guess Alerts Its Clients Over Possible Data Breach

World-renowned fashion retailer; Guess confirmed over the course of the past week that some of its clients had their confidential data compromised in a brutal ransomware attack that the fashion…

Read More
Massive Ransomware Attack On Israeli Websites Foiled 1

New Ransomware Highlights Widespread Adoption of Golang Language By Cyberattackers

A new malicious software (ransomware) variant that leverages Golang has been released. It indicates that cybercriminals leverage GoLang (programming language) to execute their malicious actions. CrowdStrike obtained a specimen of…

Read More
Singapore’s IT Security Outlook

Researcher Discovers Susceptibility Affecting Numerous Linux Marketplaces

The cross-site scripting (XSS) susceptibility plus various supply chain operations greatly impact on the Linux marketplaces, which are located on the Pling platform. This is the outcome of a study…

Read More
A Guide to Cyber Security Salary

Honeywell Introduces Operational Technology Cybersecurity Service to Facilitate Monitoring and Response, and Boost Safety

Honeywell is a massive organization in the American industrial market, and an industrial cybersecurity world leader. The organization has introduced an advanced cybersecurity monitoring and occurrence response service. This service…

Read More
Security Terms Threat Vulnerability Risk

Industrial Switches from different Vendors Impaired by Similar Exposures

Industrial switches are made using universal firmware developed by Korenix Technology, a leading provider for industrial networking solutions based in Taiwan. As a result, nearly all industrial switches in the…

Read More
Massive Ransomware Attack On Israeli Websites Foiled 1

A Comprehensive Answer to the Frequently Asked Question “What is WannaCry Ransomware?’

In the last decade, cybercrime has become more sophisticated. Most individuals are not very keen on cybercrime and assume only corporates and businesses are targets. Ransomware is a prevalent form…

Read More
Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register