Protect Yourself Against Identity Theft

Protect Yourself Against Identity Theft

Yahoo has been hacked. LinkedIn has been hacked. Accounts have been stolen. Identities have been stolen. Identity theft is said to have taken place when…

GlobalSign SSL Certificate Revocation Error Causes Issues for Users

GlobalSign SSL Certificate Revocation Error Causes Issues for Users

GlobalSign SSL certificates seemed to be causing issues to many users recently. Users around the globe who were accessing HTTPS websites secured with GlobalSign SSL…

How Important Endpoint Protection is for Businesses

How Important Endpoint Protection is for Businesses

Today, when almost all businesses have gone digital, hackers and cybercriminals targeting businesses is just normal. There are great security issues that business would face…

Endpoint Security

SECURITY IN THE TIMES OF IoT

IoT: Unprecedented expansion Internet of Things (IoT) is now part of our daily life. The internet has pervaded our day-to-day lives like never before and…

zero day exploits

How Enterprise IT Would Gain From Artificial Intelligence

Artificial Intelligence (A.I) is touching lives in the most intimate of manners and seems to be playing a vital role in creating a new and…

pc security

Stealing Data from Locked PCs Possible Using USB Device

This should come as a surprise, a mild or perhaps not-so-mild shock, to those many people who lock their computer screens while temporarily moving away.…

ransomware

Ransomware That Strikes Posing As Windows Update

Fantom, a new ransomware discovered recently, strikes disguised as a legitimate Microsoft Windows update. Thus it tricks users into downloading it, thereby paving the way…

ddos

When DDoS Attacks, Botnets Play Mischief

DDoS attacks (Distributed Denial of Service attacks) and the data breaches that accompany such attacks are of serious consequence; these constitute the major share of…

zero-day vulnerability

Project Sauron Malware has been Spying Government PC’s for Five Years

Project Sauron- that’s the name of the sinister malware that has been spying on government computers and computers at major organizations for over five years.…

pos security

Samsung Pay flaw that could be exploited by hackers

Samsung Pay reportedly has security flaws, as serious as POS security flaws, that could help hackers skim credit cards wirelessly and make fraudulent transactions. Security…

X