Home Search

Android - search results

If you're not happy with the results, please do another search
Insider attacker leak data

Negligent Users are Biggest Cybersecurity Threat to German Organizations: Survey

0
You are only as strong as your weakest link and the cybersecurity industry is no different. A recent survey by SolarWinds, a provider of...

Why Plain Virus Protection Isn’t Enough These Days: Reason Security Product Review

0
PRODUCT REVIEW By Reason Security Despite the many reports about the dangers of cyberattacks, many individuals and organizations still remain unconcerned when it comes to protecting...
Gaming

Data Breach Affected 218 Million ‘Words with Friends’ Gamers

0
The popular mobile social game company Zynga Inc. is the latest victim of a cyber-attack that compromised the personal information of more than 218...
IoT Connections to Reach 83 Billion by 2024: Report, CISA alerts critical infrastructure, CISA – FBI holiday season alert

IoT Attacks Rising in Cybercriminal Underground Communities: Trend Micro

0
Trend Micro, a cybersecurity solutions provider, stated that the Internet of Things (IoT) has become a primary target for cybercriminals. In its latest research,...

Cybersecurity startup Acronis secures US$ 147 million

0
Cybersecurity solutions provider Acronis recently secured US$ 147 million in an investment round led by Goldman Sachs. With the latest investment, the Singapore and...
Digital Transformation

1,000 percent increase in DNS amplification attacks since 2018

0
By Augustin Kurian The second quarter of 2019 saw a major swelling of DNS amplification attacks reaching a whopping 1,000 percent spike. The report...
SIM Swapping

Researchers Uncover Espionage Operation using ‘Simjacker Vulnerability’

0
Security researchers at AdaptiveMobile Security, a Cyber-Telecoms Security company, uncovered a new undetected vulnerability that’s being exploited by attackers for targeted surveillance of Android...
cyberthreats, bug

Google launches New Bug Bounty Program

0
Google recently announced the launch of its new Developer Data Protection Reward Program (DDPRP) and the expansion of Google Play Security Reward Program (GPSRP),...
USB charging stations

Why You Should Stop Borrowing Someone’s Charger

0
Cybersecurity experts stated that using someone else charging cable might bring threats to your mobile devices. Attackers could exploit charging cables/cords to access sensitive...
Whatsapp

WhatsApp yet to fix flaws identified by Check Point

0
Check Point Software Technologies Ltd says it has found flaws in the WhatsApp messaging app that hackers could potentially exploit to manipulate messages in...

MOST POPULAR

RECENT POSTS

Cybersec Europe

HackVSIT 6.0

CyberX Bahrain

Infosecurity Europe