Tag: Security

petya

Petya Ransomware attack: How to defend against it

Following the WannaCry ransomware fiasco, the Internet is victimized by another ransomware called Petya. However, this nasty worm seems to be primarily targeting business...
cloak and dagger

New Cloak and Dagger exploit allows full control over an Android device, and remains...

Security researchers at UC Santa Barbara have found a new vulnerability in Android which affects all versions of the OS. Known as cloak and...
whatsapp

WhatsApp end-to-end encryption: Things you need to know

WhatsApp end-to-end encryption has gained a lot of attention from users as well the government. Recently a petition was filed by a WhatsApp user...

Gartner identifies top 10 Security technologies to battle cyber security

Analyst firm Gartner has listed top 10 security technologies which should be adopted by the organizations to win the cybersecurity battle in 2016. There is...
whatsapp-app

Indian government may ban WhatsApp for implementing 256 bits end-to-end encryption

WhatsApp efforts to impress its users by encrypting communication on the platform may put it at odds with Indian authorities. There is a particular...

Consumers install apps without being aware of the consequences, says Kaspersky Labs research report

Kaspersky Lab, in the recently published "Are you cyber savvy?" research report, has revealed that consumers are installing a wide range of apps on...

Facebook Bug Bounty program awards over Rs. 5 crores to Indian security researchers

Indian researchers have received over Rs. 5 Crores from Facebook for finding bugs on its platform under Facebook's Bug Bounty program. Around 205 security researchers...

Kaspersky Lab reports Love was big business for cyber criminals and Spammers

Valentine's Day means not only spreading of love messages but also big business for cyber criminals. Nowadays, many online retailers run special sale during...

Instagram offers Two-Factor Authentication for Customers who care more for security

Instagram users may have experienced the new way to login to their photo-sharing accounts. In fact, the news that a two-factor authentication has been...
anonymous-hacker-fbi-pc-tablet-media

Anonymous hacker revealed list of 20000 FBI agents, 9000 DHS officers

An anonymous hacker recently revealed a list of nearly 20,000 Federal Bureau of Investigation (FBI) agents and 9,000 Department of Homeland Security (DHS) officers....
Mazda Motor Corporation

Mazda Motor Corporation recalls 374,000 cars to fix faulty Takata airbags

On Friday, Mazda Motor Corporation stated that 374,000 U.S vehicles would be recalled owing to defective front passenger-side airbags that were made by Takata....
Microsoft to warn users against suspected state-sponsored hacking attacks

Microsoft to warn users against suspected state-sponsored hacking attacks

Microsoft has implemented a mechanism that automatically notifies users if any one of their accounts have been compromised either by an individual or state-sponsored hacking groups. The...
China Counter Terrorism Law Pc-Tablet Media

Tech companies in China need to hand over encryption keys, as per the new...

The Chinese parliament has passed a controversial anti-terrorism legislation that requires technology companies to hand over confidential information including encryption keys. However, the details...
Google Drive Security Research

Google to fund $1 Million for Google Drive Security Research in 2016

  Google has allocated $1 Million grant for Google Drive security research in 2016. The fund will be allocated to independent security researchers who identify...
Lenovo, Dell and Toshiba Utilities

Dell, Lenovo and Toshiba Utilities put PCs vulnerable to attacks, says researcher

In the case of vulnerabilities in OEM support utilities, computers are left wide open to attacks. Three manufacturers namely Toshiba, Dell and Lenovo, have...

SOCIAL KARMA

31,339FansLike
152FollowersFollow
1,175FollowersFollow
10,652FollowersFollow
21,249SubscribersSubscribe

LATEST NEWS

LATEST REVIEWS