Is US 2016 Presidential election database safe from cyber attacks
With only one week left for the United States Presidential Election of 2016, scheduled for Tuesday I.e November 8,2016, the populace is understandably concerned...
Belkin WeMo Devices Expose Smartphones to Attacks
Eduard Kovacs wrote an interesting post about Belkin WeMo Devices Expose Smartphones to Attacks that I would like to share.
"Researchers Find Vulnerabilities in Belkin...
Insufficient Mobile Security, Business Enterprises at Risk
Significance of Mobile Device use in Enterprises
Living in an advanced, technology-controlled culture today has its perks, especially for business enterprises and the likes. In...
It’s time for organizations to put mobile security into spotlight!
Smart Phones usage is increasing in the corporate world and that’s due to the fact that we need to keep an instant access to...
Connected cars can now smartly handle Cloud Security threats
Cyber security threats in the world of connected cars are getting paramount these days and to narrow them down, emerging technologies are being served...
UK Travel startup TamTam Travels offers discounts to members using digital currency!
UK based travel startup TamTam Travels is all set to bring in innovation into its business with the use of Jio Token- its own...
How Do You Define Prevention?
Scott Simkin wrote an interesting post about How Do You Define Prevention? that I would like to share.
"In discussions about cybersecurity, a word that gets...
Australian Red Cross Leaks Blood Donor Data
Eduard Kovacs wrote an interesting post about Australian Red Cross Leaks Blood Donor Data that I would like to share.
"The Australian Red Cross Blood Service...
Cyber – The Latest Front on the Election Battlefield
Alastair Paterson wrote an interesting post about Cyber - The Latest Front on the Election Battlefield that I would like to share.
"To say that the...
Mirai Botnet Infects Devices in 164 Countries
Ionut Arghire wrote an interesting post about Mirai Botnet Infects Devices in 164 Countries that I would like to share.
"Mirai, the infamous botnet used in...
MOST POPULAR
How healthcare cyber risk teams can plan ahead for HIPAA’s Security...
Enacted in 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the regulatory standard for U.S. healthcare providers, health organizations, and health...