Phishing Attack on San Diego School Led to Data Leaked

A phishing attack led to the data breach, seems like the trend is not going to end any sooner. This time a school was attacked and the students’ social security…

Read More

How to protect your sensitive data

A critical data security trends in 2019 highlights show that protecting access to increasing volumes of sensitive data will be a challenge. So business owners should be careful about their…

Read More

Massive Data Breach Hit Caribou Coffee, All Customers Transacted From Aug 28 to Dec 3 Affected

Caribou Coffee, a U.S. based Coffeehouse chain with 603 branches has made a public disclosure that thousands of their customer records from at least 219 branches in Minnesota were affected…

Read More

Malaysian Bank CIMB Denies Security Breach

The Malaysian bank CIMB has denied security breach affecting its online banking portal, despite thousands of customers complaining of a hack. The Kuala Lumpur-headquartered CIMB, which is the fifth largest…

Read More

What We Currently Know About’s 100 Million User Account Breach?, a mainstream Q&A site is the latest victim of a massive security breach which affected an estimated 100 million user accounts. According to the initial report, the following records…

Read More

Ethical Hacking Key to Data Security

Ethical hackers have a very important role to play as regards data security; they make up the first line of defense against cybercrime. Thus, in the realm of cybersecurity, the…

Read More

Australia’s Department of Health, Leading the Compliance for Essential 8 Security Policy

The Australian’s Department of Health is a cybersecurity conscious-agency, out of the many executive departments in the land down under. This is through its push for the implementation of privileged…

Read More

IT Security Culture Evolution of Businesses Exposed

Security culture is the behavior in an organization that contributes to the protection of data, information, and knowledge, very useful today in the wake of implementation of Data Protection Laws,…

Read More

Apple Request Developers to get macOS apps notarized

The introduction of macOS Mojave, Apple has introduced notarization for Mac applications that are offered outside of the Mac App Store. The component is intended to shield Mac user’s malicious apps. Apple…

Read More

New Phishing Attack That Uses Multiple Replica Sign-In Pages

Hackers today depend on phishing attacks and social engineering like never before; in fact, 9 out of 10 data breaches today start with a phishing scam. Organizations today have stepped…

Read More

Page 1 of 4


Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password