Have you ever scrolled through the search results returned by Google and felt like, argh…this is too much? Too much content and it keeps on getting updated. What if I told you that what Google returns as results is just but the tip of the iceberg. That there is much more content that is somewhere […]
Zoom on 90-day Security Plan, Releases Zoom 5.0
Robust Security Enhancements Include Support for AES 256-Bit GCM Encryption. Zoom Video Communications, Inc. today announced robust security enhancements with the upcoming general availability of Zoom 5.0, a key milestone in the company’s 90-day plan to proactively identify, address, and enhance the security and privacy capabilities of its platform. By adding support for AES 256-bit […]
Ensuring Safety and Security in the Digital Age
Listing the best practices to combat possible cyber threatsListing the best practices to combat possible cyber threats
6 Online Tips for secure browsing experience
Credits More people are getting connected and hooked in the internet, with the advent and explosion of technology driven gadgets such as AI’s, smartphones, tablets, portable computers, laptops and to name a few, nobody can disagree the convenience and ease of use it delivers. Being physical present will be gone, now lining up in long que […]
The Next Generation of Mobile Phone Security Features
From banking details to time-sensitive work messages, we carry our whole lives on our smartphones. This is why it can be so devastating when they’re lost or stolen. While well-chosen passwords and phones locked with unique numbers can go a long way to protect your data, the new frontier in mobile security is biometrics. […]
Bank Cyber Fraud: Is your bank protected from threats?
Bank Cyber Fraud: The Greatest Threat to Banks Today Most people sleep peacefully at night knowing their hard earned money is resting safely in banks. However, in recent years, things have changed. The finance industry has been revolutionized by digital technology, and this has made it more vulnerable to bank cyber fraud, security threats.
McAfee: 5 years threat evolution report
Report Provides Five-Year Threat Retrospective, GPU Malware Assessment, and Techniques for Exfiltrating Data from Corporate Networks; Ransomware Rises 127% from Q2 2014 to Q2 2015
WooThemes under DDoS Attack
Adii the Co-Founder of WooThemes has confirmed the DDoS Attack sent via email.
Malware Targets Javascript Files on WordPress Plugins
I ran a few scans on my WordPress Blogs using this utility since yesterday and today.
Beware Your Smartphone Is Spying on You
An Android developer recently discovered a clandestine application called Carrier IQ built into most smartphones that doesn’t just track your location; it secretly records your keystrokes, and there’s nothing you can do about it. Is it time to put on a tinfoil hat? That depends on how you feel about privacy.