With financial year closing around the corner, fraudsters are looking forward to cash in tax refunds. They can do anything to get their hands on your ...
The last 4-5 years have seen a lot of chaos created by malware and viruses. Initially the malware that only targeted home users gradually increased th...
We no longer have need to keep cash in our wallets. But why and how did this happen? All this is because of the increasing use of digital wallets on ...
Magento, a popular Content Management System and an open-source ecommerce platform implemented over 200,000 sites was recently targeted by attackers. ...
Amidst increasing cyber-attacks, warnings have been delivered by authorities of Northern Ireland to the staff members. Every day the world continues ...
Most of the U.S. cities and companies are finding themselves at more jeopardy after the latest ransomware attack on Atlanta. Data breaches are increas...
Recently, the security experts at Palo Alto Networks discovered a brand new Trojan horse that used Telegram for data extraction. More precisely, it us...
Android devices are prone to malware attacks and infections. Malware can get in to your Android device by different sources like free downloading webs...
Several companies put their trust on SIEM, Security Information and Event Management to handle security issues that they may encounter. Basically, SIE...
There is a little misconception about malware that it only exists on computers. However, what most of us are not aware of is that there are different ...
Smartphones come with different functionalities. We use them for almost every task that we do on our system. Like the computer, smartphones are also p...
Mobile Security Team Check Point recently found a huge malware campaign that has already affected 5 million Android users. This means that more than 5...