In a recent update, Google has rolled-out Chrome 79 stable version for its users. This version of Chrome consists of two very important browser security features – Improved password protection and real-time phishing protection.
Malware attacks, data breaches, phishing attacks,...
Cybersecurity firm TrapX Security recently announced that it has named Ori Bach as its new Chief Executive Officer. Mr. Bach who previously served as TrapX's Chief Product Officer and EMEA General Manager comes to his new role with more than...
Security experts said cybercriminals are customizing their Phishing attack methods to trick companies and their users. According to Microsoft, phishing campaigns grew from 0.2 percent in January 2018 to 0.6 percent in October 2019.
In its recently released 2019 Cybersecurity...
Security researchers stated that cybercriminals have created a new ransomware variant titled “Zeppelin” to target healthcare and IT companies in the U.S., Canada, and Europe. It’s said that Zeppelin ransomware is reportedly a new variant of the VegaLocker/Buran ransomware.
Background...
By Lux Rao, Director – Solutions & Consulting, NTT Ltd. (India)
As enterprises face a barrage of cyberattacks, and the nature of these attacks is growing in sophistication, it is becoming difficult to pinpoint the vulnerabilities. The bad actors are...
By ID Assist
As businesses continue to welcome digital transformation with open arms, the challenges they face are increasing. Electronic data is being widely used for daily operations. Small scale organizations are using Big Data for analyzing customer trends and...
A green padlock followed by the organization name (also in green color) means that website uses an Extended Validation (EV) certificate. Green padlocks without the following organization name in green color, means that website uses a TLS/SSL certificate and...
According to a survey, titled Current Status of Data Privacy Compliance, from Email security provider Egress, around 44 percent of employees admit that they’ve mistakenly exposed personally identifiable information (PII) or business-sensitive information using their corporate email accounts. Over...
Researchers from vulnerability detection firm Tenable discovered seven critical vulnerabilities in Amazon-owned Blink XT2 security camera systems. If exploited, the vulnerabilities could allow hackers to remotely view the camera footage, listen to audio output, and use the infected device...
Deny or accept, but technology has always been a part of our lives and now it’s almost become one with our bodies too. Wearables have become more practical, easy to use and more affordable than ever. But the rising...














