Have you ever scrolled through the search results returned by Google and felt like, argh…this is too much? Too much content and it keeps on getting updated. What if I told you that what Google returns as results is just but the tip of the iceberg. That there is much more content that is somewhere […]
Zoom on 90-day Security Plan, Releases Zoom 5.0
Robust Security Enhancements Include Support for AES 256-Bit GCM Encryption. Zoom Video Communications, Inc. today announced robust security enhancements with the upcoming general availability of Zoom 5.0, a key milestone in the company’s 90-day plan to proactively identify, address, and enhance the security and privacy capabilities of its platform. By adding support for AES 256-bit […]
Ensuring Safety and Security in the Digital Age
Listing the best practices to combat possible cyber threatsListing the best practices to combat possible cyber threats
6 Online Tips for secure browsing experience
Browse privatelyI’m always a fan of using google chrome, press control+shift+n altogether to browse securely and privately, this feature prevents your tracking and browsing history, saved username, and passwords. You can forget your co-employees, colleagues spying on your online activities with no worries.
The Next Generation of Mobile Phone Security Features
From banking details to time-sensitive work messages, we carry our whole lives on our smartphones. This is why it can be so devastating when they’re lost or stolen. While well-chosen passwords and phones locked with unique numbers can go a long way to protect your data, the new frontier in mobile security is biometrics. […]
Bank Cyber Fraud: Is your bank protected from threats?
Bank Cyber Fraud: The Greatest Threat to Banks Today Most people sleep peacefully at night knowing their hard earned money is resting safely in banks. However, in recent years, things have changed. The finance industry has been revolutionized by digital technology, and this has made it more vulnerable to bank cyber fraud, security threats.
McAfee: 5 years threat evolution report
Report Provides Five-Year Threat Retrospective, GPU Malware Assessment, and Techniques for Exfiltrating Data from Corporate Networks; Ransomware Rises 127% from Q2 2014 to Q2 2015
WooThemes under DDoS Attack
Adii the Co-Founder of WooThemes has confirmed the DDoS Attack sent via email.
Malware Targets Javascript Files on WordPress Plugins
I ran a few scans on my WordPress Blogs using this utility since yesterday and today.
Beware Your Smartphone Is Spying on You
An Android developer recently discovered a clandestine application called Carrier IQ built into most smartphones that doesn’t just track your location; it secretly records your keystrokes, and there’s nothing you can do about it. Is it time to put on a tinfoil hat? That depends on how you feel about privacy.