How to elevate your mobile security?
Smart Phones are turning into life blood to our humans. And that’s due to the fact that they are not just being used to...
Teenage student arrested for launching Westmoreland Cyber attacks
A teenage student was arrested on Wednesday this week for launching a series of cyber attacks on more than a dozen local school districts....
Cybersecurity 2017 – The Year In Preview: Trade Secret Theft Takes Center Stage
Check to state you have read and
agree to our Terms and Conditions
Terms & Conditions and Privacy Statement
Mondaq.com (the Website) is owned and managed by...
IoT: Usability Dream or Privacy Nightmare?
Javvad Malik wrote an interesting post about IoT: Usability Dream or Privacy Nightmare? that I would like to share.
"Probably the best £100 I’ve ever spent...
Threats Driving You Nuts? Try Threat Hunting With Sqrrl
This article originally appeared on the IBM Security Intelligence blog.
Squirrels have many predators and enemies (hawks, snakes and, of course, cars), but Sqrrl shows how the hunted can become...
Liberia is still under the influence of Cyber Attack
Liberia is still reigning under the influence of cyber attack which hit it badly last week and dislodged its network communication with outside world....
Australia has declared a war against ISIS in cyberspace
Australia has made it official that it has launched a warfare against Islamic State Group in cyberspace. However, this announcement has increased the cyber...
Casinos and hotels in Las Vegas become soft targets for cybercriminals
Casinos and hotels located in Las Vegas are now acting as soft targets to cybercriminals. And this was revealed in a research conducted by...
SO WHAT’S NEW WITH THE NEW UK CYBERSECURITY STRATEGY?
Adrian Davis wrote an interesting post about SO WHAT’S NEW WITH THE NEW UK CYBERSECURITY STRATEGY? that I would like to share.
"The intent to enforce…...
Malware hacks and turns headphones into microphones
Through a recently created malware, researchers were able to repurpose earphones with no in-line mic into microphones that can record audio. Image INQUIRER.net
It’s understandable...
MOST POPULAR
How to Quickly Recover After a Third-Party Data Breach
I write all the time about how to prevent ransomware attacks and how the root cause in so many cases is an improperly secured...