cybersecurity

How Enterprise IT Would Gain From Artificial Intelligence

Artificial Intelligence (A.I) is touching lives in the most intimate of manners and seems to be playing a vital role in creating a new and better world for us human beings. The news that Apple recently brought a Seattle-based A.I…

pc security

Stealing Data from Locked PCs Possible Using USB Device

This should come as a surprise, a mild or perhaps not-so-mild shock, to those many people who lock their computer screens while temporarily moving away. Well, your system, your data is not secure when you do so. It’s just a…

ransomware

Ransomware That Strikes Posing As Windows Update

Fantom, a new ransomware discovered recently, strikes disguised as a legitimate Microsoft Windows update. Thus it tricks users into downloading it, thereby paving the way for data breach… Malware researcher Jakub Kroustek of security firm AVG has discovered this rather…

ddos

When DDoS Attacks, Botnets Play Mischief

DDoS attacks (Distributed Denial of Service attacks) and the data breaches that accompany such attacks are of serious consequence; these constitute the major share of cyber-attacks that happen and the consequences are mostly very devastating too. Such DDoS attacks are…

zero-day vulnerability

Project Sauron: Malware That Has Been Spying on Government Computers for Five Years

Project Sauron- that’s the name of the sinister malware that has been spying on government computers and computers at major organizations for over five years. Researchers who have detected this malware have given it the name Project Sauron because of…

pos security

Samsung Pay flaw that could be exploited by hackers

Samsung Pay reportedly has security flaws, as serious as POS security flaws, that could help hackers skim credit cards wirelessly and make fraudulent transactions. Security researcher Salvador Mendoza, who has discovered the limitations in Samsung Pay’s security, has explained that…

HTTPS

Lack of Basic HTTPS Leads to Major Data Breach at Clash of Kings Forum

Clash of Kings is a very popular mobile game with millions of avid players being members of its official forum. This forum has got hacked and details of approximately 1.6 million accounts have been stolen. The hacker found a vulnerability…

Mac Malware

File Converter Backdoor Mac Malware Infects Mac OS X

The latest malware to hit Mac operating systems is the EasyDoc Converter. Cyber security experts have discovered this dangerous Mac malware on reputed online websites offering applications and software for the Mac OS. If Mac users still believe that their…

Think Tank

Michael C.Burgess says Ransomware criminals should be “shot at sunrise”

US politician and Texas Representative Michael C.Burgess has voiced a very strong opinion regarding the issue of malware attacks when he said that Ransomware perpetrators should be “shot at sunrise”. He made this comment at the encryption hearing before a…

MSP IT Services

Comodo Updates Free Managed Services Solution

Today, Comodo announced availability of its next version of its free Comodo IT management platform, Comodo One MSP version 3.1. Comodo One MSP (formerly known as Comodo ONE) is a version of the Comodo One integrated IT management platform that…

Page 1 of 5412345...102030...Last »