WhatsApp remains adamant on sharing its encryption keys due to Mobile Security concerns
WhatsApp, now owned by Facebook has requested all the law enforcement authorities around the world that it will not offer any backdoor to retrieve...
The Struts Saga Continues: Groundhog Day All Over Again
This post was originally published here by ZAID AL HAMAMI.
In a previous blog post I talked about the Struts CVE (CVE-2017-5638) that’s affecting much of the...
Here’s the list of Five Major Cyber Attacks of 2016!
Cyber attacks became something of a hot topic of 2016 and that’s due to the fact that they not only have the potential to...
Google updates about mobile security measures on its Android Nougat
Google has given an update about the mobile security measures which are being implemented in its latest Android 7.0 Nougat (N) release. And it...
Apple offers Safari Browser update to tackle fake ransomware
Apple Inc has issued a software update to tackle the circulation of a fake ransomware attack which demands money in order to unlock the...
the cure for infectious malware
This post was originally published here by  Chantelle Patel.
Organizations have seen rapid growth in cloud adoption over the last few years which in turn have introduced...
New Report Uncovers Cloud Security Concerns and Lack of Security Expertise
The 2017Â Cloud Security Report reveals that security concerns, lack of qualified security staff and outdated security tools remain the top issues keeping cyber security...
Europe fails to curb cyber attacks on Aviation Industry
Europe has failed to curb cyber attacks on Airline operators, Aircraft manufacturers and authorities related to the aviation industry. And that’s due to the...
Study proves that Desktop scanners are vulnerable to Cyber Attacks
Researchers from the Ben Gurion University of the Negev and the Weizmann Institute of Science have found out a way to make office scanners...
Ransomware encrypts critical files of Dutch Parliament
Some state sponsored actors have succeeded in encrypting critical files related to a computer network of the Dutch parliament. As per our sources, the...
MOST POPULAR
Security Silos Are Failing: Why CTEM Is Key to Smarter Cyber...
Too much of a good thing is always problematic, and cybersecurity tools are no exception. Corporate teams juggle a surplus of cybersecurity tools, all...