internet-security-vpn

Online Security News Recap: April

With so much happening in the world of online security and cybercrime, we’ll give a quick summary of some major news stories happening across...
mobile-vpn

VPN Explained: How Does It Work?

How Do VPNs Work? A Virtual Private Network, most commonly abbreviated to VPN, allows a user to create a more secure internet connection by connecting...

Hackers Sold Personal Data Of 267 Million Facebook Users On Dark...

Hackers have sold personal data of a whopping 267 million Facebook users for just Rs 41,500 (approximately 500 Euros) that includes email addresses, names,...
internet-security-vpn

4 Ways to Keep Your Personal Electronic Data Secure

Over the last 3 decades, the Internet has transformed everyday life in ways no one could have imagined. Simple tasks we now accomplish in...
WhatsApp

WhatsApp and Other IM Apps Not as Safe as You Think

If you thought instant messaging platforms like WhatsApp and Telegram that provide end-to-end encryption give you rock-solid security, think again. Researchers from cyber-security firm...
google-chrome

Why You Should Stop Using Google Chrome Browser

Google has made all our lives easier. Anytime you have a question, you can ask Google. Want to email a friend? Log into your...
security

Why You Should Do Email Sandboxing to Enhance Your IT Security

Cybercrime is on the rise, and businesses are in constant fear that their valuable data could end up in the wrong hands. The concerns...

CookieMiner Malware Steals Passwords, Credit Card Details In Chrome, Safari

Global cybersecurity company Palo Alto Networks has discovered a malware that is capable of stealing saved usernames and passwords in Google Chrome, saved credit...
Stock Image

Google Assistant Will Record Your Conversations, But Only If You Allow...

Facing flak for letting contractors record and listen to users' conversations via Google Assistant, the tech giant has announced to make some key changes...
Coding

Google Berates Samsung for Making Galaxy Phones More Hackable

Samsung accidentally made a bunch of Galaxy smartphones more hackable than they already were, undoubtedly rubbing some Google Project Zero (GPZ) team members the...
Hacker

Hackers Target Microsoft-Owned GitHub, demand ransom

Hackers have hit open source software development platform GitHub, removing code repositories and asking ransom from developers in order to restore their source codes. According...
Stock Image Depression

Google Says It Sent 12000 Warnings to Users About Government-Backed Hacking...

Google sent 12,000 warnings to users in 149 countries that they were targeted by government-backed attackers during the three-month period from July to September...
debit-card-online-shopping

Millions Of Credit Card Details Left Exposed By Payments Startup

A New York-based payments startup left millions of credit card transaction records exposed for anyone to see on the Internet for nearly three weeks...
artifical-intelligence

Software Technology Trends That Will Dominate 2019

You know of that software technology that you are obsessed with this year? Well, next year it could no longer be relevant or be...
analysis

The Crucial Function of Log Data Analysis

Almost all businesses and organizations today rely on computer systems and software for most of their applications. These systems and networks produce logs, which,...

TOP STORIES