Home Search
remote work - search results
If you're not happy with the results, please do another search
Researcher finds GandCrab ransomware in Super Mario image
A researcher discovered a ransomware embedded into a downloadable Super Mario image using steganography method. Matthew Rowen, a security researcher from Bromium, an advanced malware...
Automotive cybersecurity on the wrong road: Report
Flooring the accelerator pedal of a secure vehicle may still be a thing of the future. According to a recent study by Ponemon, nearly...
Check Point partners with Ericom to jointly prevent browser-based attacks
Cybersecurity solutions provider Check Point Software Technologies recently announced the integration of its software solutions with Ericom Software, a web security solutions provider for...
Over 9,000 Cisco routers are vulnerable to cyber-attack: Researchers
Potential vulnerabilities in Cisco’s small business routers could allow a remote attacker to exploit the devices to get sensitive diagnostic data. Cisco, the networking...
IT solutions provider Electric raises $25 million
Electric, a real-time IT support solutions provider, recently raised $25 million in a Series B financing round led by GGV Capital along with the...
West African banks and financial firms suffer cyber-attacks: Symantec
Multiple banks and other financial companies in several West African countries have suffered from different hacking attacks, which are underway since mid-2017
According to a...
Amazon warns technical error exposed customers’ information
Amazon recently reported a technical error that exposed users’ personal information like names and email addresses. In an email sent to its customers, Amazon...
Almost half of New Zealand firms unprepared for data breaches: Report
A recent survey from the information technology company Hewlett-Packard (HP) revealed that 45 percent of the companies in New Zealand rated themselves as not...
Malware turns Android devices into mobile backdoors: Report
A recent research from cybersecurity firm McAfee exposed an active phishing campaign that turns Android devices into mobile proxies. The McAfee mobile research team...
Researcher points out multiple vulnerabilities in IoT operating systems
A research expert from the security firm Zimperium recently pointed several vulnerabilities in a number of IoT (Internet of Things) operating systems, including FreeRTOS...