We have been discussing a lot about ransomware. We have been reporting many ransomware attacks that took place in the recent months, and we have also been discussing how ransomware…
Read MoreWe have been discussing a lot about ransomware. We have been reporting many ransomware attacks that took place in the recent months, and we have also been discussing how ransomware…
Read MoreFederal vulnerabilities are still in question. The new VEP charter takes the initiative to address the flaw and put them on review for the better of all. Experts said the…
Read MoreThere was a time when anyone who bought a computer would, as soon as the system has arrived, think of an antivirus. The antivirus, it was thought, was enough to…
Read MoreJust when the Apple released 11.1 as a patch to address the crack in WiFi and other exploits, here comes the news that it has been hacked again. It was…
Read MoreRussia has ventured into a new battlefront to counter the NATO forces in Europe. According to the latest report, the Russians are exploiting the point of vulnerability of troop’s smartphones….
Read MoreReports say that a team of Russian hackers has been exploiting a Google flaw to launch attacks on investigative journalists. This security flaw in a Google service was reportedly known…
Read MoreSeems like it’s the season of Android malware. Android users are now being continuously targeted by hackers. Be it the Judy malware, discovered earlier this year in May or the ExpensiveWall…
Read MoreSmartphones today are pocket-sized computers. We use them for web browsing, cash transactions, gaming, official and business correspondences and much more. Moreover, with BYOD being an accepted trend in the…
Read MoreEquifax, the credit security agency that recently faced a massive security breach, is yet to reveal the reasons behind the hacking which shook the company and compromised the security of…
Read MoreCybercriminals can now utilize a malware-infected surveillance camera network to send additional malware or new commands, as well as exfiltrate data from devices connected to the network through infrared signals….
Read More