Massive Cybersecurity Breach at Yahoo

Massive Cybersecurity Breach at Yahoo

On Sep 22, 2016, Yahoo issued a press release: “A recent investigation by Yahoo! Inc. has confirmed that a copy of certain user account information…

Protect Yourself Against Identity Theft

Protect Yourself Against Identity Theft

Yahoo has been hacked. LinkedIn has been hacked. Accounts have been stolen. Identities have been stolen. Identity theft is said to have taken place when…

GlobalSign SSL Certificate Revocation Error Causes Issues for Users

GlobalSign SSL Certificate Revocation Error Causes Issues for Users

GlobalSign SSL certificates seemed to be causing issues to many users recently. Users around the globe who were accessing HTTPS websites secured with GlobalSign SSL…

How Important Endpoint Protection is for Businesses

How Important Endpoint Protection is for Businesses

Today, when almost all businesses have gone digital, hackers and cybercriminals targeting businesses is just normal. There are great security issues that business would face…

Endpoint Security

SECURITY IN THE TIMES OF IoT

IoT: Unprecedented expansion Internet of Things (IoT) is now part of our daily life. The internet has pervaded our day-to-day lives like never before and…

zero day exploits

How Enterprise IT Would Gain From Artificial Intelligence

Artificial Intelligence (A.I) is touching lives in the most intimate of manners and seems to be playing a vital role in creating a new and…

pc security

Stealing Data from Locked PCs Possible Using USB Device

This should come as a surprise, a mild or perhaps not-so-mild shock, to those many people who lock their computer screens while temporarily moving away.…

ransomware

Ransomware That Strikes Posing As Windows Update

Fantom, a new ransomware discovered recently, strikes disguised as a legitimate Microsoft Windows update. Thus it tricks users into downloading it, thereby paving the way…

ddos

When DDoS Attacks, Botnets Play Mischief

DDoS attacks (Distributed Denial of Service attacks) and the data breaches that accompany such attacks are of serious consequence; these constitute the major share of…

zero-day vulnerability

Project Sauron Malware has been Spying Government PC’s for Five Years

Project Sauron- that’s the name of the sinister malware that has been spying on government computers and computers at major organizations for over five years.…

X