Negligent Users are Biggest Cybersecurity Threat to German Organizations: Survey
You are only as strong as your weakest link and the cybersecurity industry is no different. A recent survey by SolarWinds, a provider of...
Why Plain Virus Protection Isn’t Enough These Days: Reason Security Product Review
PRODUCT REVIEW
By Reason Security
Despite the many reports about the dangers of cyberattacks, many individuals and organizations still remain unconcerned when it comes to protecting...
Data Breach Affected 218 Million ‘Words with Friends’ Gamers
The popular mobile social game company Zynga Inc. is the latest victim of a cyber-attack that compromised the personal information of more than 218...
IoT Attacks Rising in Cybercriminal Underground Communities: Trend Micro
Trend Micro, a cybersecurity solutions provider, stated that the Internet of Things (IoT) has become a primary target for cybercriminals. In its latest research,...
Cybersecurity startup Acronis secures US$ 147 million
Cybersecurity solutions provider Acronis recently secured US$ 147 million in an investment round led by Goldman Sachs. With the latest investment, the Singapore and...
1,000 percent increase in DNS amplification attacks since 2018
By Augustin Kurian
The second quarter of 2019 saw a major swelling of DNS amplification attacks reaching a whopping 1,000 percent spike. The report...
Researchers Uncover Espionage Operation using ‘Simjacker Vulnerability’
Security researchers at AdaptiveMobile Security, a Cyber-Telecoms Security company, uncovered a new undetected vulnerability that’s being exploited by attackers for targeted surveillance of Android...
Google launches New Bug Bounty Program
Google recently announced the launch of its new Developer Data Protection Reward Program (DDPRP) and the expansion of Google Play Security Reward Program (GPSRP),...
Why You Should Stop Borrowing Someone’s Charger
Cybersecurity experts stated that using someone else charging cable might bring threats to your mobile devices. Attackers could exploit charging cables/cords to access sensitive...
WhatsApp yet to fix flaws identified by Check Point
Check Point Software Technologies Ltd says it has found flaws in the WhatsApp messaging app that hackers could potentially exploit to manipulate messages in...