Page 500

Different type of Hackers (And what they do)

Different type of Hackers (And what they do)

Hackers! For too long we have associated this name with a person wearing a hoodie, sitting in a darkened room, using a computer with a lot of wires an...

Top 7 Computer Viruses That You Need To Be Careful Of

Top 7 Computer Viruses That You Need To Be Careful Of

No matter whether you are pro or a novice, if you are a computer user, then you must have faced the issue called virus attack. Computer virus is a mal...

Make Microsoft Edge More Secure By Enabling Application Guard in Windows 10

Make Microsoft Edge More Secure By Enabling Application Guard in Windows 10

Although Edge browser is not as popular as its competitors like Firefox and Chrome, yet it is one of the most secure and compatible browser, especiall...

Types of Computer Security Threats and How to Avoid Them

Types of Computer Security Threats and How to Avoid Them

It’s a dangerous world out there! Doesn’t this sound dramatic, indeed but when we are referring to the world wide web and computer security it ...

Cybersecurity Skills Gap A Threat

Cybersecurity Skills Gap A Threat

We all are interconnected using technologies like IOT (Internet Of Things), social media, and mobile computing. Now the problem that arises is that...

Zero Trust Network: Milestone In IT Security Or Just Another Trust Model?

Zero Trust Network: Milestone In IT Security Or Just Another Trust Model?

Data security is taking a toll on our lives; no matter what we do, nothing seems sufficient! Even the top-notch security experts are scratching their ...

Metamorphic Virus: All You Need To Know

Metamorphic Virus: All You Need To Know

A metamorphic virus can steal your data and demand ransom for the financial benefits. Besides affecting your machines defense mechanism, metamorphic v...

Beware Of Android Phones With Pre- Installed Malware In The Market

Beware Of Android Phones With Pre- Installed Malware In The Market

Well, we are not very far from the world where one day, everything that can protect you or can give you shelter will be hacked and controlled by the a...

Ransomware Getting Trickier

Ransomware Getting Trickier

2017 has been an unbelievable year in terms of cybersecurity. Ransomware threats like WannaCry and NotPetya were witnessed by users. These threats tre...

Is Gmail Third Party Apps Breaching Your Privacy

Is Gmail Third Party Apps Breaching Your Privacy

Google has expanded its services in almost every stream possible. It’s Google’s centricity and dedication that has developed faith and trust among...

Cyber Threats & Vulnerabilities In The Maritime Industry

Cyber Threats & Vulnerabilities In The Maritime Industry

2017 has been awakening call due to the back to back attacks by ransomware like WannaCry & NotPetya. Many shipping companies were duped of thousan...

RAMpage: One More Vulnerability Discovered

RAMpage: One More Vulnerability Discovered

With technology and popularity of digital devices such as smartphones, tablets and laptops, we certainly have plenty of room to save our information. ...