Security

MobileIron nominated for Best Mobile Security Solution award!

American software company MobileIron which specializes in offering solutions related to Mobile Device Management and Enterprise Mobility Management has announced this week that it has been shortlisted for the ‘Best Mobile Security Solution’ award by the SC Awards Europe. And the company is very much hopeful that it is going to bag the award in […]

Sound waves being used to launch cyber attacks!

Have you ever imagined that simple sound waves can be used to launch cyber attacks on smart devices..? Yeah, you’ve read it right! Researchers from the University of Michigan have found a new way of using sound waves to launch cyber attacks on devices loaded with Accelerometers. The study made by the researchers states that […]

United States appoints Four Thousand trained cyber security professionals to protect nation’s critical infrastructure

Idaho National Laboratory in association with Department of Homeland Security has made it official that over 900 cyber security professionals have succeeded in passing out the Industrial Control Systems Cyber Security Training Course in this year. Technically speaking, the above said the specialized course is meant to offer training to interested personnel who will then […]

Mobile Security features on Google Pixel and Nexus phones are exceptional!

Google which released a recent report related to the security feature of all its Android versions has made it official that all those who using Google Pixel and Nexus phones will most likely get monthly security patches on a consistent note from now on. Therefore, users of these mobiles will continue to avail the best […]

Google discloses some facts on Android’s Mobile Security

Google, touted as a leader in offering mobile operating systems to the world has announced that half of the devices working on Android OS have gotten security updates by the end of 2016. Thus, it enables the android OS users to defend themselves from any kind of digital crime and espionage. In an annual report […]

Cloud Security beefed up for IBM Blockchain

IBM has upped the cloud security feature for its Blockchain Cloud Environment which is in coincidence with the release of its Hyperledger Fabric Version 1.0. The software giant has added that their blockchain networks were only as safe as the cloud infrastructure they resided on and so has announced it at the “InterConnect”- IBM’s Annual […]

Australian immigration offices are extremely vulnerable to Cyber Attacks

The Australian National Audit Office (NAO) has recently released the latest report on their government’s cyber security potential and concluded that the immigration department and the tax office department of Australia are extremely vulnerable to cyber attacks. The NAO has claimed that the Department of Immigration and Border Protection and the Australian Taxation Office have […]

Bringing security into the CICD pipeline with Halo

This post was originally published here by  casey pechan. There’s a transformation happening in how IT is delivered in enterprises everywhere – what was once a predictable and stable IT environment has now become more fluid and is in a constant state of change. The average lifetime of a server, for example, has gone from […]

Cyber Attacks on fitness trackers, smartphones, and voice-activated gadgets

All those who are using Fitness trackers, smartphones and voice-activated gadgets such as Amazon Echo, here’s some bad news for you. The National Cyber Security Center (NCSC) and the National Crime Agency (NCA) of UK have generated a report which states that hackers are targeting people using the above said sophisticated gadgets to hold people […]

Know how Google offers mobile security feature to users downloading new apps

Google has finally disclosed the secret on how it finds malware hidden apps for users downloading new apps. As a part of its business objective to offer utmost mobile security to all its users, Google takes the help of a security solution called Verify Apps to analyze viruses and other malware hidden in the apps […]

Share this page