Cyber Security 1

Cyber Security Policy: To Impose or Not to Impose?

Educate teenagers about the ill-effects of drugs and chances are they might refrain from doing them. On the other hand, ‘order them’ not to do drugs, and chances are they…

Read More
The Ever Changing Cyber Security Landscape

The Ever-Changing Cyber Security Landscape

The Cyber security landscape is changing (and evolving). No doubt about that. And as new security threats evolve, so do new methods and tools for protecting our data and to…

Read More
Open EDR
Cyber Attack

Cyber Criminals Will Attack Critical IT Infrastructure

A survey of top cyber security professionals reveals that they fear a massive cyberattack on U.S. critical infrastructure. And many believe that this massive attack is not far away. They…

Read More
Cyber Security after OPM Breach

Cybersecurity after OPM Breach

The data breach at the United States Office of Personnel Management (OPM) in 2015 was a wakeup call for the U.S. Government. It was just what many government officials had…

Read More
Macbook

Chinese Cyber Security Laws Force Apple to Build Data Center in China

Apple Inc. will soon be storing cloud data of its Chinese customers with a Chinese government-owned company in accordance with the latest cyber security laws of China. The southern province…

Read More
SpyDealer Android Malware

SpyDealer Android Malware Steals Data from WhatsApp and Facebook

Cyber security researchers have discovered a new Android malware dubbed “SpyDealer” that can hack most popular social media, communication, browser, and mobile mail client apps to steal and exfiltrate data….

Read More
Business Losing Security

Businesses failing to spend on security might lose trillions of dollars

Cyber-crime is a major threat for all businesses, and in spite of the growing number and complexity of cyber security solutions, many businesses and customers are still defenseless. Juniper Research recently…

Read More
NHS Cyber Attack

NHS Cyber Attack Issued By Someone Fluent In Mandarin

A recent cyber-attack that crippled some of the world’s most critical computer networks might have originated in China. The ransomware attack infects a user’s computer via a malicious email—similar to…

Read More
Reusing passwords

Reusing passwords can be a major security risk

A recent report from risk management firm Digital Shadows revealed that cyber criminals extensively use stolen passwords and other credentials to access various platforms and websites. Their report “Protect Your Customer and…

Read More
Wannacry like threat

Linux/Unix platforms are anymore! Wannacry like threat is the reason

Researches have found out that the Samba vulnerability is becoming a new threat to the Linux and Unix systems. There is a high probability that this might lead to even…

Read More

Page 13 of 14

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register