Cybersecurity- Insiders

FDA formulates fresh guidelines to protect Medical Devices against Cyber Attacks

The US Food and Drug Administration (FDA) department has issued a new set of guidelines which have to be followed by medical device manufacturers...

Cyber Security experts believe that hackers can tamper Airline Bookings

Cyber Security Experts have warned that hackers can tamper airline bookings, making flyers land on a wrong plane during their festive break. Furthermore, the...
Cybersecurity- Insiders

DDoS Cyber Attack on popular Torrent sites!

Popular Torrent sites ExtraTorrent (ET) and The Pirate Bay (TPB) are experiencing DDoS attacks from the past three days causing numerous problems to their...

All Homeland Security websites are vulnerable to Cyber Attacks

According to an audit released last week by the US Department, all Homeland Security websites are said to be vulnerable to cyber attacks from...
Cybersecurity- Insiders

Hackers spread fake death rumors of Britney Spears

Britney Spears, the USA’s pop sensation was declared dead on Sony Music Twitter handle on the boxing day of this year. According to the...
Cybersecurity- Insiders

WNBA to use Mobile Security App LiveSafe

Mobile Security app ‘Live Safe’ has added a new customer to its client-base. The Women’s National Basketball Association(WNBA) has taken up an initiative to...
Cybersecurity- Insiders

Data Breaches which topped the year 2016!

Cyber Security was a paramount concern for many government and private firms in this year. And so here's the list of top data breaches...

Locky Ransomware alert for Facebook, Twitter and LinkedIn users

A Locky Ransomware alert has been issued to Facebook, Twitter and LinkedIn users residing all over the world. As per the alert, Users of...
Cybersecurity- Insiders

Bot Fingerprinting

A web bot is designed to make life on the web easier; a script that automates repetitive tasks and does them much faster than...
Cybersecurity- Insiders

Web Application Health

The reality of today’s world is that there is no clear perimeter to an organization’s information systems. That means that controlling the network edge...