Cyber criminals using coronavirus in new e-mail scams

OMAHA, Neb. — Cyber criminals are using the coronavirus outbreak as click-bait to steal personal information."We see scammers regularly taking advantage of these sensational...

Graham Cluely – Glock Takes Stock

Highlighting the dangers of the use of third party frameworks. Update now...: A nasty vulnerability has been discovered in the WhatsApp desktop client used by...

Cyber Criminals Using Coronavirus Concern to Assist with Intrusions – Glock Takes Stock

Criminals and politicians hate to waste a good crisis…: As we have seen with other public concerns, cyber criminals and threat actors use these...

Case Study: Jouve Digital Takes on Cybersecurity

Case Study: Jouve Digital Takes on Cybersecurity This is the story of a digital firm that transformed its endpoint defense strategy from reactive to proactive...

Hackers Can Exfiltrate Sensitive Data from Air-Gapped Computers

New cybersecurity research shows that attackers can exfiltrate sensitive information from the air-gapped computers by manipulating the brightness of the screen. The attack was discovered...

#hacking | Malaysia warns of Chinese hacking campaign targeting government projects | National Cyber...

#hacking | Malaysia warns of Chinese hacking campaign targeting government projects | National Cyber Security | Hacker News

#cybersecurity | #hackerspace | IT, Legal, Compliance: We Need to Talk. | National Cyber...

Different priorities and critical communication gaps between IT security teams, compliance professionals, and legal counsel are threatening the regulatory and cybersecurity posture of financial...

How the Internet of Things revolution could intensify hacking attacks

Alexa is listening The potential is endless and already we are seeing IoT proliferate in our homes. My Amazon Echo smart speaker can control the...

Gorgon Group Ensnares Travel, Utility Targets

The expansion of Gorgon’s techniques indicates they aren’t just fishing for victims, but have targets in their sights. Prevailion’s Tailored Intelligence team has...

Who Are the Gamaredon Group and What Do They Want?

In new research published yesterday by SentineLabs, head of research Vitali Kremez reveals how a Russian-backed APT threat actor known as the ‘Gamaredon group’...

Latest article

Hedera

Hedera Cryptocurrency, the next generation of cryptocurrencies

Most cryptocurrencies and decentralized apps operate on blockchain technology. It does, however, have a few flaws. Hedera has emerged to resolve these...
Clever Mpoha

SAVENDA Group CEO Clever Mpoha Sees Larger Opportunity in Surging Global Demand for Copper

Industry analysts report that the world is heading toward a major copper crunch. Within 10 years, shortages of the highly conductive metal...

Movies That Have Been Removed From Netflix and Why

Titles That Netflix Has Reluctantly Removed As most people know, Netflix is constantly adding and removing content from its catalogs. There are...