WD My Book Live Users Who Were Hacked Eligible For Trade-in...

Users who were affected by the recent My Book Live device attack will be eligible for data recovery services provided by Western Digital and...
hacker

Zero Trust Is A Requirement For All Modern Cybersecurity Strategies

Cybersecurity will always depend on a solid foundation. Systems and infrastructure that are not built on a stable and strong foundation will always be...
Hacker

Microsoft Admits To Signing Malicious Netfilter Rootkit Driver

Tech giant Microsoft has now confirmed signing a malicious driver being distributed within gaming environments. According to Bleeping Computers, this driver, called "Netfilter," is a...

Cyberattack Or Technical Glitch: Does the Cause Of A Disruption Matter?

The recent disruption in cloud computing service provider Fastly resulted in swaths of the internet becoming inaccessible. Many of the world’s largest websites including...

WhatsApp Files Lawsuit Against Indian Govt Over Chat ‘Tracing’

Taking the user privacy war to the court over new IT rules, Facebook-owned WhatsApp on Wednesday filed a lawsuit against the Indian government in...

Data Of 100 Million Android Users At Risk Due To Cloud...

After examining 23 Android applications, mobile app developers potentially exposed personal data of over 100 million users through a variety of misconfigurations of third-party...
ransomware

India Worst Hit Country In Terms Of Weekly Ransomware Attacks

India has seen the most number of ransomware attack attempts per organization, with an average of 213 weekly attacks since the beginning of the...

167 Fake Android, iOS Apps Being Used To Steal Money

Cyber-security researchers have identified a stash of 167 counterfeit Android and iOS apps being used by hackers to steal money from people who believe...
cyber-security

The State Of Bot Cybersecurity In 2021

A bot, which is a short form for a robot, is a software program intended to perform automated tasks on your website. The automated...

Virtual Private Networks (VPNs): Your Questions Answered

In a society that is becoming increasingly reliant on technology, digital security must be a top priority. A virtual private network (VPN) is an...

Lagging Patch Management Leaves VPN Infrastructure Insecure

Organizations transitioning to a remote workforce need a secure remote access solution. However, the significant security issues associated with virtual private networks (VPNs) have...

Should You Move On After Outlook’s Latest Bug Issues?

Back in 1999, Microsoft experienced one of the most embarrassing incidents of its storied history. The company’s 50 million or so Hotmail users had...
Hacker

Fake ‘Clubhouse For PC’ Ads Spotted On Facebook

Cybercriminals briefly floated fake 'Clubhouse for PC' app ads on Facebook in a bid to plant malware on devices of unsuspecting users before taking...

There’s A Google Play Store App Offering Free Netflix, DO NOT...

Cybersecurity researchers said on Wednesday that they have discovered a fake service app on Google Play Store that offers users view Netflix on their...

Apps Can Spy Other Apps On Your Android Phone, Google To...

Are you aware that any single app on your smartphone can see every other app that you have installed on your device, thus accessing...

TOP STORIES