Home Search

microsoft - search results

If you're not happy with the results, please do another search
Messaging

Mobile messaging apps new hideout of Dark Web activities: Study

0
After shutdown of illicit dark websites such as Alphabay and Hansa in July this year, criminals are trying messaging apps to evade crackdown, a...
Ghana

Ghana to establish a national cybersecurity center

0
The government of Ghana is mulling on establishing a national cybersecurity center to safeguard the nation against cybercrime. According to the President Nana Akufo-Addo,...
DHS

DHS issues directive for federal agencies to use DMARC, HTTPS, and STARTTL

0
In an attempt to secure emails and deploy authentication technologies, the U.S. Department of Homeland Security (DHS) on October 16, 2017, issued a binding...
Automotive cybersecurity

Auto industry finally serious about cybersecurity: Jeep Hackers

0
Modern-day connected cars carry million lines of code. In fact, the technology is almost 100 times more powerful than Apollo 11, the first spacecraft...
Deloitte Acquires Zimbani to Boost its Cybersecurity Practice

Deloitte hack: Iranian hackers lured firm’s employee via Facebook ‘honey trap’

0
It has been revealed that Iranian hackers were behind the major data breach at Deloitte, one of the ‘big four’ accountancy firms. They pulled...
Technology Governance

Information and technology governance needs more work: ISACA Research

0
There is lot more to be done in information and technology governance, suggested a new research led by Information Systems Audit and Control Association...
Deloitte

Deloitte hacked! Attackers may have exposed sensitive information

0
One of the ‘big four’ accountancy firms, Deloitte, is the newest victim of a massive cyber attack. Confidential emails and “plans of some its...
Dual attack

Researchers unveil dual spam campaign with Locky and FakeGlobe

0
Researchers at Trend Micro have recently discovered a large spam campaign in which cyber criminals use two types of ransomware alternately to force victims...
Flaw in Bluetooth Devices

8.2 billion devices worldwide at risk of remote attacks

0
Nearly 8.2 billion devices are at risk, globally, from remote attack vectors like device take over and man-in-the-middle (MITM), et al. According to researchers...
ransomware, ryuk ransomware, cox media

Ransomware named Defray on the loose

0
Yet another ransomware is making the rounds. Dubbed Defray, the ransomware is targeting the education, healthcare, manufacturing, and technology sectors. According to Proofpoint, a cybersecurity...

MOST POPULAR

RECENT POSTS