The second Ransomware report of 2018 highlights the entire details of the kind of attacks happened at the beginning of the year. It not only gives the details of ransomware threat figures bu... Read more
Infected Devices were given by Taiwanese police to the cyber-security quiz winners Police have apologized after giving infected memory sticks as prizes in a government-run cyber-security qui... Read more
Image spam is a technique where a spam is delivered in the form of an image. This is mainly done to evade spam filters that scan specific keywords. It works better because any user can read... Read more
The first Ransomware report of 2018 highlights the entire details of the kind of attacks happened at the beginning of 2018. It not only gives the details of ransomware threat figures but als... Read more
15-Year-Old macOS security flaw leads to full system compromise One security researcher started a Twitter storm on the New Year’s Eve stating “One tiny, ugly bug. Fifteen years. Full system... Read more
Mobility is spreading fast among the enterprise and there is no turning back. BYOD (Bring Your Own Device) has received plenty of attention as a result and IT departments are on the toes to... Read more