Home Search
remote work - search results
If you're not happy with the results, please do another search
How Tesla has always vouched for safe and secure cars
By Augustin Kurian
Until the late 2000s, electric cars had a reputation for being ugly and slow. This was until a small Silicon Valley startup...
Cyberinc partners with InfiniVAN
Cybersecurity startup Cyberinc recently announced its partnership with InfiniVAN to provide local web isolation cloud solutions in the Philippines. The alliance integrates Cyberinc's Isla...
Microsoft reports two ‘Wormable Security Flaws’ in its Windows Platform
Microsoft revealed that it has discovered two new security flaws in its Windows Desktop Services package. However, the technology giant clarified that it has...
Smart Speakers can be turned into Cyber-Weapons to make Aural Attacks: Researcher
Security researchers revealed that attackers can hack modern audio gadgets to make deafening sounds. According to Matt Wixey, a cybersecurity researcher at technology consulting...
Apple offers $1 million Bug Bounty to hack its iPhone
With an aim to find potential vulnerabilities in its network systems, Apple recently announced a reward of $1million (£830,000) for bug hunters. According to...
DSLR Cameras are vulnerable to attacks: Researchers
Security researchers have discovered that DSLR cameras, which are connected to a Wi-Fi network, are vulnerable to ransomware attacks. The researchers, from the security...
Karamba Security partners with Cypress to offer Embedded Cyber Security Solutions
Karamba Security, a provider of embedded cybersecurity, recently announced its collaboration with the semiconductor manufacturing company Cypress Semiconductor to jointly improve cybersecurity for the...
State-backed Chinese attackers target multiple German-based companies
A number of firms in Germany have confirmed that they have been targeted by a state-backed Chinese hacker group. A report from public broadcaster...
VPN: A volatile market with high potential
Unlike the regular run-in-the-mill virtual private networking (VPN) that people use to masquerade their location or to access sites that are forbidden in the...
Anaesthetic machines vulnerable to cyber-attacks: Researchers
Security researchers revealed that an anaesthetic machine can be hacked and controlled remotely if left accessible on a hospital computer network. Cybersecurity firm CyberMDX...