22.8 C
Bengaluru

How to Protect Against Ransomware Attacks

Ransomware is a type of malware that encrypts a victim's files. The attackers then demand a ransom from the victim to restore access to...

Top News

Africa

Europe

Last week New York Times revealed that former USA state secretary Hillary Clinton used a private email account instead of official email address for communications while serving the State department. It is reported that Clinton used...

Gulf Countries and Data Security Breaches

It is a no brainer to mention that cyber crime is increasing and today, the focus is more on money & cyber war than anything else. We see a lot of such incidents these days including...

Microsoft patches Zero Day vulnerability

In its latest Patch Tuesday releases, Microsoft pushed patches to fix about 20+ vulnerabilities in various MS products includes servers & desktops, Office, IE and .NET. One of the update is specifically in addressing the zero-day flaw...

Asia

spot_img

Bussiness

Politics

Ransomware is a type of malware that encrypts a victim's files. The attackers then demand a ransom from the victim to restore access to the files upon payment. Ransomware attacks are becoming increasingly common, with billions...

Private emails, why is it a bad decision?

Last week New York Times revealed that former USA state secretary Hillary Clinton used a private email account instead of official email address for communications while serving the State department. It is reported that Clinton used...

Gulf Countries and Data Security Breaches

It is a no brainer to mention that cyber crime is increasing and today, the focus is more on money & cyber war than anything else. We see a lot of such incidents these days including...

Science

How to Protect Against Ransomware Attacks

Ransomware is a type of malware that encrypts a victim's files. The attackers then demand a ransom from the victim to restore access to the files upon payment. Ransomware attacks are becoming increasingly common, with billions...
Last week New York Times revealed that former USA state secretary Hillary Clinton used a private email account instead of official email address for communications while serving the State department. It is reported that Clinton used...

Gulf Countries and Data Security Breaches

It is a no brainer to mention that cyber crime is increasing and today, the focus is more on money & cyber war than anything else. We see a lot of such incidents these days including...

Stay tuned

Subscribe to our latest newsletter and never miss the latest news!
Our newsletter is sent once a week, every Monday.

Sports

Latest news

How to Protect Against Ransomware Attacks

Ransomware is a type of malware that encrypts a victim's files. The attackers then demand a ransom from the victim to restore access to...

Private emails, why is it a bad decision?

Last week New York Times revealed that former USA state secretary Hillary Clinton used a private email account instead of official email address for...

Gulf Countries and Data Security Breaches

It is a no brainer to mention that cyber crime is increasing and today, the focus is more on money & cyber war than...

Microsoft patches Zero Day vulnerability

In its latest Patch Tuesday releases, Microsoft pushed patches to fix about 20+ vulnerabilities in various MS products includes servers & desktops, Office, IE...

Another set of Celeb Leaks

After Jennifer Lawrence it is now time to see what hackers have about Kim Kardashian. Private photographs of Kim Kardashian and Vanessa Hudgens, which...

Google Hacking – FBI warns public

Google Dorking, Also known as “Google hacking,” involves using specialized search parameters to locate very specific information. Examples include: » (U) Site: Searches and lists all the results for that particular...

OWASP AppSec Tutorial Series

Here is a list of videos published in YouTube about application security. It is a great compilation of video and a must to watch...

Identity Protection Services

Identity theft is on the increase. Everyday we hear stories about identity theft by hackers and millions of identifies are on sale after such...

Cloud Security Report–Spring 2014

The Cloud Security Report Spring 2014 edition from Alert Logic is available for public download. This report is based on the analysis of data...

Whitelisting in Java

Java vulnerabilities and zero day exploits are very common these days. It has take to the extend that security experts start recommending disabling the...

Encryption and Security, think again

NSA is accused to be spying on the people for years. In a recent article, NewYork Times describes the strategies by NSA on the exploitation...

WireShark Tutorial

Wireshark is a one among the top sniffing tools used by any network / security analysts. Here are to great videos on the tips...