great-wall-of-china

State Censorship, the ‘Great Firewall’ & VPNs in China

China’s ‘Great Firewall’ has long been a powerful symbol of state censorship and, although other countries have attempted to replicate it, it remains the...
proxy network security

Why You Ought To Think About Hiding Your IP Address

The first identity that people get when they are born is their name. Then it is all numbers from there. You will get your...

Avast Antivirus Harvested Users’ Data And Sold To Google, Microsoft

In a sensational revelation, an investigation on Monday claimed that the popular Avast antivirus -- installed on nearly 435 million Windows, Mac and mobile...
Android Malware

Android Malware ‘Agent Smith’ Has Hit 25 Million Devices

Cybersecurity solutions provider Check Point on Wednesday revealed that 'Agent Smith,' a new variant of mobile malware, has quietly infected around 25 million Android...
cyber-security

5 Common Ways Malware Can Infect Your Computer

Each day, cybercriminals release nearly 1 million new malware threats in many forms. From spyware that monitors your computer activity to viruses that destroy...
facebook-like-dislike

267 Million Facebook Users’ Personal Data Gets Leaked

A database containing personal details of more than 267 million Facebook users was allegedly left exposed on the web, according to a report from...
matrix

What Causes Security Alert Fatigue?

40% of surveyed respondents confirmed that they receive security alerts that contain little to no actionable information to make investigating a security situation possible....
Android

Fake Anti-Virus Apps Lurking in Google Play Store for Android

Apps with names like Virus Cleaner and Antivirus security and which appear to be genuine anti-virus (AV) or virus-removal apps have been spotted on...
Aadhaar Booth

Aadhaar numbers leaked in the millions, says security researcher

A French researcher has claimed that he found a security lapse that allegedly exposed millions of Aadhaar numbers of dealers and distributors associated with...
Hacker

Hackers Now Using Voice-Mimicking AI for Cyber Attacks

In a warning, an Israeli cyber body has unearthed a new type of attack where hackers are using Artificial Intelligence (AI) technology to impersonate...
mobile-vpn

Why Do I Need A VPN?

In this digital age, you might be a bit overloaded by all the different add-ons, software programs, and tech gadgets being hawked in every...
rokkex

Have You Heard About Product Hunt’s Competitor In Blockchain?

Numerous businesses today face these 2 issues: lack of investment and lack of sources to find those investments. ICO has already spoiled the idea of...
analysis

The Crucial Function of Log Data Analysis

Almost all businesses and organizations today rely on computer systems and software for most of their applications. These systems and networks produce logs, which,...
cyber-security

Chinese Database Leaks 42.5 Million Records From Dating Apps

As many as 42.5 million records of users of different dating apps were found in a single Chinese database that doesn't have password protection,...
Hacker

Maintaining Network Security At Your Organization

Cybersecurity threats are real. They are responsible for hundreds of millions of dollars in lost sales, widespread identity theft, corruption and dismantling of networks,...

TRENDING