Top 3 Ransomware Examples You Should Know

Have you ever heard of holding something for ransom? Perhaps you’ve seen stories on the news of valuable items being stolen, with a return...

Proofpoint Fights Facebook For Permission To Use Lookalike Domain Names

Cybersecurity company Proofpoint has filed a lawsuit against Facebook in a bid to continue its phishing awareness training using lookalike domains. The lawsuit filed this...

How PureVPN Secures Your Online Activities And Opens Up Geo-Restricted Content

In this technological era, internet is not a mere source of entertainment but it’s also the most powerful way of communication and transferring data....

Google Berates Samsung for Making Galaxy Phones More Hackable

Samsung accidentally made a bunch of Galaxy smartphones more hackable than they already were, undoubtedly rubbing some Google Project Zero (GPZ) team members the...

How Add-Ons Can Build Trust & Promote Safe Browsing

Trust is the single most important currency a business can have with its customer base. Without trust, there is nothing. In the business world,...

Pairing Face Unlock With A Smile Or Wink Can Strengthen Phone...

As hackers find ways to unlock your phone with your face while you sleep or using a photo from social media to do the...
Google Assistant

Google Promises Action Against Those Listening in on Your Conversations

After facing widespread criticism for eavesdropping on users' conversations via its Assistant to improve speech recognition technology, Google said that it was conducting a...
Hacker

Hackers Target Storage Websites Like Google Docs, Microsoft Sway To Steal...

Cybersecurity researchers on Friday said they have identified a new type of impersonation attack that is using Google file sharing and storage websites like...
facebook

Cambridge Analytica Booked By Indian Investigation Bureau For Illegally Collecting Facebook...

The CBI has registered a case against UK-based Cambridge Analytica and Global Science Research Limited in a case of alleged illegal harvest of personal...

VPN Explained: How Does It Work?

How Do VPNs Work? A Virtual Private Network, most commonly abbreviated to VPN, allows a user to create a more secure internet connection by connecting...
Stock Image

Cybercriminals Using Legitimate Tools to Hack into Computers

Cybercriminals widely use software developed for normal user activity, administrator tasks and system diagnostics to avoid getting caught quickly after carrying out their attacks,...

DDoS Attacks Drop As Hackers Go After Cryptocurrencies Instead

The surge in cryptocurrency has led cybercriminals to realign their strategies and as a result, they are using their computing power to mine cryptocurrencies...

Keeping Your Network Safe in 2019

As technology continues to evolve, direct employee monitoring is starting to become obsolete. While this system does work, it’s better to have reliable software...

WhatsApp Private Groups Searchable by ANYONE on the Internet

A worrying new discovery about WhatsApp Group Chats has been made recently - it turns out that those so-called private groups can be found...
cyber-security

5 Simple Ways To Improve Small Business Cybersecurity

There are several simple methods to improve cybersecurity in your small business. As the costs of cyber-attacks and data breaches continue to rise, it...

TOP STORIES