Convicted Anonymous Hacker Raises Big Funds for His Cybersecurity Start Up

Convicted Anonymous Hacker Raises Big Funds for His Cybersecurity Start-Up

A former member of the hacktivist group Anonymous has made news by raising big funds for his cybersecurity start-up. Adam Bennett, who has founded the cybersecurity start-up Red Piranha, has…

Read More
Twitter Rolls Out Key Cybersecurity Improvement Vs. Hacking

Twitter Rolls Out Key Cybersecurity Improvement Vs. Hacking

If you own a Twitter account, you are in possession of a high-value commodity in the cybercriminal underworld. Twitter accounts, especially with lots of followers, provide hackers with channels to…

Read More
Open EDR
Tesla

Your Tesla Model S Could Be Gone in 1.6 Seconds

If you have a Tesla Model S parked in your garage, pay careful attention to this news. A group of cybersecurity researchers from the Computer Security and Industrial Cryptography (COSIC)…

Read More
More Information about the British Airways Data Breach

More Information about the British Airways Data Breach

RiskIQ, a cybersecurity company, through its threat researcher Yonathan Klijnsma, has exposed the similarity of the British Airway’s data breach to the Ticketmaster breach of which was publicly revealed last…

Read More
5 Steps on How to Create Your Own Cybersecurity Risk Assessment

5 Steps on How to Create Your Own Cybersecurity Risk Assessment

Cybercriminals design sophisticated attacks on the cloud infrastructure daily. Risk profiles must be created when organizations are adopting containers. The risk profile should contain the types of threats and vulnerabilities…

Read More
Ohio Living The Newest Victim of Cyber Attack

Ohio Living, The Newest Victim of Cyber Attack

SME’s, also known as Small Medium Enterprises are the most exposed companies when it comes to cyber attacks, virus infection and other forms of cybercrime. Very recently, Ohio Living, a…

Read More
4 Reasons Ransomware Attacks Should Be Duly Reported

Attackers Revamp Old Ransomware for Cryptocurrency Malware

In another tale of malware types, cybercriminals are starting to repurpose old ransomware with new capacities to illegally mine or steal cryptocurrencies like Bitcoin and Monero. Cybersecurity firms Fortinet and…

Read More
Chrome based Browsers Have Loopholes that Enable Hackers to Infiltrate Wifi Routers

Loopholes in Chrome enable Hackers Break Into WiFi Routers

Surecloud, a cybersecurity firm has released a report about a Google Chrome, Chromium, Opera, Vivaldi and other Blink-engine based browsers’ unpatched flaw that enables cybercriminals to penetrate the home wifi…

Read More
Bloomberg’s Singapore Tech Summit Discusses Cybersecurity in Detail

Bloomberg’s Singapore Tech Summit Discusses Cybersecurity in Detail

The Bloomberg ‘Sooner Than You Think’ technical summit in Singapore discusses all the different aspects of cybersecurity in Singapore. Talking at the ‘Sooner Than You Think’, Janil Puthucheary, senior minister…

Read More
How Enterprises Can Combat Cybersecurity Challenges On The Cloud

How Enterprises Can Combat Cybersecurity Challenges On The Cloud

This is the age of cloud technology; we depend a lot on the cloud, for computing, for storage, for data analytics, and much more. Enterprises seek to make the most…

Read More

Page 21 of 28

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register