Online Bank Accounts Among Hackers’ Favorite Targets

Online bank accounts are among the most favorite of targets for all hackers, as per a recent survey report. A report published by Positive Technologies (a global provider of enterprise…

Read More

Unpatched Linux Vulnerability Used for Monero Mining

Guess what the favorite tool of hackers is when they want to infect Linux servers with crypto mining malware. It’s a 5-year-old security vulnerability that is being exploited in the…

Read More

Damages Caused by Malware

The harm caused by a virus or malware, which infects a home PC or a corporate system can be diverse – from an insignificant increase in traffic in your network…

Read More

How Secure are Microchips

Banks across the world spend a lot of time and money to protect the information of their customers. An irony, the easiest way for hackers to get information is through…

Read More

Security Vulnerability Detected by Google in Microsoft Edge

Google has now detected a new vulnerability in Microsoft Edge, the Windows 10 default web browser; this detection has been made as part of Google’s Project Zero program. On MSFT,…

Read More

Do Not Ignore the Existence of Cyber Attacks

Do you understand what is a real cyber attack and how to prepare yourself in case it happens? Every day cyber attacks are rapidly spreading all over the world, growing…

Read More

Oracle MICROS POS Vulnerability Affects 300,000 Systems

POS (Point-of-Sale) systems are always among the favorite targets of hackers; POS terminals always provide them the chance to lay their hands on all kinds of data- credit card data,…

Read More

New Google Apps Script Vulnerability Provides Hackers New Opportunities

A new vulnerability in Google App Scripts has opened the door to new possibilities for cyber criminals. Researchers at cybersecurity firm Proofpoint have discovered a new way of exploiting Google…

Read More

A Vulnerability in Kernel Slowing Down Intel Processors

Register first notices a significant vulnerability in all Intel processor chips. The major design flaw in Linux kernel patch is going to make a huge impact, and all operating systems…

Read More

IoT Security Starts with these 3 Steps

We have seen how in the recent past botnet attacks were molded to infect and connected devices by taking advantages of the various vulnerabilities. October 2017, was at the heights…

Read More

Page 1 of 5

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register