What is cyber security? How to build a cyber security strategy

Cyber security is the practice of ensuring the integrity, confidentiality and availability (ICA) of information. It represents the ability to defend against and recover from accidents like hard drive failures or power outages,...

Gas Is Too Expensive; Let’s Make It Cheap!

A few months ago, while undertaking unrelated research into online connected devices, we uncovered something surprising and realized almost immediately that we could be looking at a critical security threat. What we found...

New macOS malware hijacks DNS settings and takes screenshots

The general perception about Apple devices is that they are protected from malware and other hacking attacks. But since hackers are getting smarter and more sophisticated in their attacks things are changing for...

Sofacy APT Adopts New Tactics and Far East Targets | Threatpost

Supporters of Net Neutrality Vow to Fight Rule Changes ...

Google has started blocking uncertified devices from running Google apps

Google’s Official Android apps such as Play Store, Maps will not run on your device if you are using uncertified ROMs or if your device is not certified you won’t be able to...

Games removed from Google Play store after infected by porn malware

Google has deleted nearly 60 games app from its Play store after security researchers have informed them that these apps were infected by a pornographic malware. An Israel-based firm, Check Point Software Technologies has...

(ISC)² Secure Summit UK Insights: The Future Impact of AI in Cybercrime

(ISC)²’s two-day Secure Summits bring multi-subject sessions from hands on practical workshops to keynotes and panel discussions, featuring local and international industry experts to maximise the learning experience and CPE opportunities. Serving the...

Memcached DDoS Attacks Will Be BIG In 2018

So after the massive DDoS attack trend in 2016 it seems like 2018 is going to the year of the Memcached DDoS amplification attack with so many insecure Memcached servers available on the...

Cybersecurity Perception vs Reality: Is Your Organization Actually Secure?

The threat of cybercrime has never been greater. Eighty...

11 ways ransomware is evolving

Ransomware detection and recovery tools and techniques are getting better. Unfortunately, so are ransomware developers. They are making ransomware harder to find and encrypted files harder to recover. One advantage that security operations have...

LATEST NEWS

MUST READ