Security

Android Security

iOS Version of Exodus Android Spyware Doing the Rounds

Security researchers have discovered a dangerous iOS spyware strain that was seen earlier this year on the official Google Play Store. Exodus is the name of the spyware and it…

Read More
Google Duplex Assistant to Reach iPhones, Most Android Phones

It’s time to welcome the Google Duplex Assistant, which will soon be available on all iPhones and most Android phones as well… It was at Google’s I/O developer conference in…

Read More
European Android Devices: Google Is The Old Microsoft

The European Union has flexed its muscles again to combat anti-competitive behavior. This time around, it is Google that is in the receiving end of the order. The search giant…

Read More
Android Antimalware Apps You Can Install Today

Antimalware Apps Recently, Google went out of their way to clean-up Google Play Store from apps pretending to be antimalware apps, but really just consuming resources of the Android device….

Read More
Beware Of Deceptive Antimalware Apps In Android

Right after Windows, antimalware vendors have set their sights on Android as their next “platform” to protect (or at the very least claiming to protect). As Windows is an undisputed…

Read More

GDPR

French Regulatory Commission Orders $50 M Fine Against Google

Google has been slapped by a 50-million Euro fine by CNIL (Commission Nationale de L’informatique et des Libertés), France’s Data Regulation Agency due to GDPR (General Data Protection Regulation) violation….

Read More
2018 Is A Better Year For Customer Data Privacy Due To GDPR

2018 can be summarized as the year when strict implementation of customer data protection policies was felt by the public, regardless of where they are located in the world. This…

Read More
Canada is Imitating EU’s GDPR, New Policy Takes Effect On Nov 2018 (2)

Canada has apparently imitated European Union’s GDPR, that is the latest news from the country’s Office of Privacy Commissioner of Canada (OPC). Under the new policy, starting November 2018, all…

Read More
Cambridge-Analytica Fiasco Aftermath Facebook to pay $645,000 Fine under UK Law

The fallout against Facebook has started, caused by the user data exposure breach due to its Cambridge-Analytica fiasco, starting with the UK’s ICO (Information Commissioner’s Office). ICO has slapped the…

Read More

DDoS

Facebook Suffers Biggest Ever Outage in its History

Facebook, which has suffered the biggest ever outage in its history, is struggling to deal with it. The partial outage that affected some users of Facebook and other platforms owned…

Read More
Why Disable SSDPUPnP In Today’s Home And Enterprises

When Did UPnP and SSDP Became Mainstream? Universal Plug and Play (UPnP) was considered revolutionary when it was introduced to Windows Millennium Edition nineteen years ago, in 2000. It was…

Read More
6 Young Hackers Caught DDoSing and Stealing Money From Bank Accounts

Six years jail time, that may become the penalty awaiting the 6 young hackers, two who were allegedly responsible for DDoS (Distributed Denial of Service) attack against Ukraine government and…

Read More
10 Masterful Steps In Combating Denial Of Service Attacks

We could define DDoS (Distributed Denial of Service) attacks as the exclusive appropriation of a resource or service with the intention of avoiding any third party access. Also included in…

Read More
Law Enforcement Shut Down DDoS Services Ahead of Christmas

Law enforcement has launched pre-emptive strikes on DDoS services keeping in mind the Christmas holiday season. Reports say that law enforcement from different countries has shut down DDoS booters in…

Read More

Infographics

How to Clean Malware-Infected WordPress Website

Basic tips that could help you clean your WordPress website if it gets malware-infected. This includes scanning the website, checking backup files, changing passwords, re-installing WordPress, re-installing themes and plugins,…

Read More
How to Choose a Firewall

Understanding how to choose a firewall, the network security system that monitors and controls all incoming and outgoing traffic based on a set of rules. Learn how to choose the…

Read More
Penetration Testing to check for exploitable vulnerabilities

Explaining step by step how a penetration test, or pen-test, helps measure the security of an organization’s IT infrastructure by attempting safe exploitation of vulnerabilities. Know how a penetration test…

Read More
Infographic

How to find out if your WordPress website is hacked? Know all about the different signs which indicate that your WordPress website might be hacked. Check for signs like invalid…

Read More

All Security News

Hackers Surgically Infected Asus Computers with Malware

What Are Bad Bots? A Bot, or internet bot, web bot, and www bot, among other similar terms, is technically a program or software that is designed to perform relatively…

Read More
Norsk Hydro Has Fallen Victim To A Serious Ransomware

Has ransomware attacked you?  Are you locked out of your desktop because of this malicious software? Or, perhaps you are struggling with accessing your important files and folders.  Well, phrases…

Read More

The internet is a big place, and anything so large can have its pitfalls. Fear not though, there are methods that you can use to stay safe when spending any kind…

Read More
comodo partner
Digital Forensic Tools Availability in the Nutshell

Taking control of your financial situation used to be a lot of footwork and largely something reserved for those able to afford premium services. Like much of the financial and…

Read More
MegaCortex, The New Entrant In The List of Ransomware

Ransomware is an ever-increasing cyber threat, which has become a troublesome issue. Although the malware has seen a decline the past year, it has again escalated at the same pace. …

Read More
Blockchain

Technology was once upon a time needed to make things easier. Well, it did succeed in making things easy but soon became the lifeline that institutions needed for survival. Whether…

Read More
Endpoint Detection and Response, The Emerging Technology

The Entertainment industry is one of, if not the biggest money-spinning industry in the world today, catering to an audience of over a billion people. Faced by the challenge of…

Read More
Obfuscation of Source Code of Phishing Messages

Low-code platform makes it stress-free for non-technical developers to build applications by means of visual interface – also known as low-code development platforms. This level of tech has increased the…

Read More
Magecart- The Card-Skimming Group and Its Many Faces

Introduction: Cybersecurity is a fast-growing industry that attracts ambitious people who want to make the world a better place. Professionals operating in this field are in more demand than ever…

Read More
mac malware

iOS vs Android is an ancient discussion. The fight is still ongoing between different fanbases, however, the discussion always comes down to the security features of both platforms. The deal…

Read More
comodo partner
Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register