Cyber crooks are stealthily hijacking computers to mine digital currency, for which a warning was issued recently. The security researchers have identified a point in cyber threats aimed at... Read more
Mobile security is the topmost concern among the organizations today, thanks to mobility and BYOD (Bring Your Own Device). Most employees now routinely access corporate data from smartphones... Read more
The second Ransomware report of 2018 highlights the entire details of the kind of attacks happened at the beginning of the year. It not only gives the details of ransomware threat figures bu... Read more
Infected Devices were given by Taiwanese police to the cyber-security quiz winners Police have apologized after giving infected memory sticks as prizes in a government-run cyber-security qui... Read more
Image spam is a technique where a spam is delivered in the form of an image. This is mainly done to evade spam filters that scan specific keywords. It works better because any user can read... Read more