Home Blog Page 277
Cybersecurity solutions provider Radiflow and industrial software provider Asset Guardian Solutions came together to launch a joint solution to expand Industrial Asset Monitoring, Change Management, and Risk Assessment Capabilities for industrial enterprises. Radiflow provides cybersecurity solutions for critical industrial automation...
Security experts found unusual activities in UC Browser for Android, exposing more than 500 million users to Man-in-the-Middle attacks. According to a research by security firm Zscaler, UC Browser and UC Browser Mini apps unusually requested an unprotected (HTTP) channel...
Networking hardware company Cisco released patches for critical security vulnerabilities that existed in its Aironet Access Point Software. Security pros at Cisco stated that the vulnerabilities could lead bad actors to remote code execution. Up on exploit, the vulnerabilities, named...
For beginners, bloggers and corporates alike, the WordPress platform is a favorite mainly due to the ease it provides in creating and maintaining personalized website(s) using a wide range of WordPress plugins. These plugins are easy to use, creative,...
By Sunil Gupta, CEO, QNu Labs The world produces 2.5 exabytes of data every day. And 3.2 billion global internet users continue to feed the data banks with 9,722 pins on Pinterest, 347,222 tweets, 4.2 million Facebook likes--plus all the other data we...
Steganography, an ancient practice of hiding secret content and text messages inside non-suspicious messages, is being increasingly used by cybercriminals to attack businesses around the world. Security researchers found a new malware campaign using WAV audio files to hide their...
By V3 Cybersecurity Since the times of ancient Egypt, visualization has played a prominent role in how we communicate.  As leaders, we often look to the past for inspiration and think of new ways to apply the teachings of history. ...
Security experts revealed that the Russian-based hacking group “Cozy Bear”, the group behind the 2016 U.S. Presidential election hack, has been working under the radar to attack the Foreign Ministries in Europe. Cozy Bear, also known as APT29, is believed to...
Cybersecurity experts have opined the Canadian government isn’t doing enough to protect businesses and consumers from data breaches. A recent survey from Keyfactor, a provider of secure digital identity management solutions, revealed that 87 percent of surveyed cybersecurity pros think...
From creepy laughs to spy bugs, Amazon’s Echo devices have been in the limelight for more than a dozen or two reasons, and it seems like Alexa is going to hog maybe a bit more of your attention due...