Google updates about mobile security measures on its Android Nougat
Google has given an update about the mobile security measures which are being implemented in its latest Android 7.0 Nougat (N) release. And it...
Apple offers Safari Browser update to tackle fake ransomware
Apple Inc has issued a software update to tackle the circulation of a fake ransomware attack which demands money in order to unlock the...
the cure for infectious malware
This post was originally published here by Chantelle Patel.
Organizations have seen rapid growth in cloud adoption over the last few years which in turn have introduced...
New Report Uncovers Cloud Security Concerns and Lack of Security Expertise
The 2017 Cloud Security Report reveals that security concerns, lack of qualified security staff and outdated security tools remain the top issues keeping cyber security...
Europe fails to curb cyber attacks on Aviation Industry
Europe has failed to curb cyber attacks on Airline operators, Aircraft manufacturers and authorities related to the aviation industry. And that’s due to the...
Study proves that Desktop scanners are vulnerable to Cyber Attacks
Researchers from the Ben Gurion University of the Negev and the Weizmann Institute of Science have found out a way to make office scanners...
Ransomware encrypts critical files of Dutch Parliament
Some state sponsored actors have succeeded in encrypting critical files related to a computer network of the Dutch parliament. As per our sources, the...
Sophos to end ransomware threat with Intercept X
Sophos Group which offers security software and hardware to enterprise networks has announced that it is going to end ransomware threat on a permanent...
MobileIron nominated for Best Mobile Security Solution award!
American software company MobileIron which specializes in offering solutions related to Mobile Device Management and Enterprise Mobility Management has announced this week that it...
Sound waves being used to launch cyber attacks!
Have you ever imagined that simple sound waves can be used to launch cyber attacks on smart devices..? Yeah, you’ve read it right!
Researchers from...
MOST POPULAR
How healthcare cyber risk teams can plan ahead for HIPAA’s Security...
Enacted in 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the regulatory standard for U.S. healthcare providers, health organizations, and health...