31.5 C
Mumbai
Saturday, October 24, 2020
Tel: 8850717892
Tags Security awareness

Tag: security awareness

Hackers After ‘Legacy Software’

First, we will see what is 'Legacy Software' Legacy Software is an old method, Technology, Computer System, or an application program of Relating to or...

Smile, You are on Camera

Over the past 10 years, the very use of facial recognition technology in surveillance has become more and more common around the world and...

How SMBs Can Diminish The Risk of a Data Breach

The year gone by as reports suggest was THE most expensive year in cybersecurity history. This was augmented by the fact that SMBs (Small...

COVID-19 Themed Phishing Campaigns

When you hear the word "Virus", the first thing that comes to your mind is "something bad for my PC". Although 2020 is an...

Latest Security Trends

Cybersecurity has seen major growth in the past few years. With people working from home more frequently, organizations allowing remote access for its employees...

AI Solutions for Cybersecurity

In a digital world, where daily financial transactions are being made, people are depositing their hard-earned money, doing financial transactions all over the world,...

Microsoft’s New Wormable Vulnerability

Microsoft's New Wormable, the unpatched bug in SMB File-sharing system Microsoft, the Redmond, Washington based software tech-giant has revealed that its latest update the Windows...

How Cyber Criminals are Taking Advantage of Coronavirus

Taking advantage of public fear and a global pandemic are perhaps in the standard rule books of cybercriminals. Therefore it's no surprise that the...

Coronavirus-Themed APT Attack Malware

Coronavirus has already become a pandemic and is the eyes and minds of every new media outlet, government, and the ordinary citizen. While the...

Firefox Bug Opens iPhone Airpods to Snooping

Third-party snooping can be terribly dangerous. Recently, the Mozilla Foundation found five high-risk bugs on the Firefox Web Browser that opened iPhone Airpods to...

Work from home: The New COVID-19 Security Challenges

The novel coronavirus (COVID-19) has been in the public eye and world news for the past 3 months. From its’ inception in the central...

Coronavirus, A Phishing Malware Campaign

The Context: With the Coronavirus outbreak making a new global buzzword, the threat of another vulnerability looms in the distance. The world is racing to...

Public USB charging ports not safe?

People are usually fond of traveling to new places, but who knew that among the other risks: charging your devices could become one. It...

Magic : The Gathering, Confirmed Leak Of Hundreds of Thousands of Player Data!

'Magic: The Gathering' confirmed the leak of hundreds of thousands of player data. Context: The maker of Magic: The Gathering has confirmed that a security breach...

Why Hackers Love Universities ?

Colleges and universities tend to attract hackers like honey attracts flies, but there are some steps IT leaders can take to batten down the...
- Advertisment -

Most Read

Metaspoilt Framework, A popular Tool among Cyber Criminals

First, in this topic, we will see, What is the Metasploit Framework? 1) What is the Metasploit Framework? Metasploit Framework is a widely used penetration testing...

Urban Farming Masterplan by MJZ Firm, Poland

An Overview: Dubbed 'the gardens of the future', the project focuses on natural food production. MJZ, an architecture firm has introduced a new urban farming...

Equinix Ransomware

RANSOMWARE attack hits Equinix companies internal system. Before going forward we will first see, What is Equinix? Equinix is a leading global interconnection platform, it is...

A brief to Architecture Journalism as a Career Path

Not all students prefer jumping into the career path of practising architecture. It is great when you design, but it could be dreading when...