Even though Bluetooth is one of the most underrated features of modern-day mobile phones, yet seldom we find a phone that lacks this feature even today. Bluetooth is a short-range wireless c... Read more
Attackers generally use botnets to perform automated tasks such as attacking other systems or hijacking their resources for malicious purposes. However, in recent times we have seen some thr... Read more
Systems and data are put at high risks of data and identity theft due to the misconfigurations of security controls. Recently, large enterprises have suffered data leaks as a result of misco... Read more
A new backdoor malware is evading detection by a few security software and intrusion detection systems by using the DNS protocol to communicate with remote attackers. For ease of use and com... Read more
Increasingly by the minute companies have turned to remote work as a precautionary measure for their employees, with the spread of Coronavirus, or COVID-19. With the focus on balancing busin... Read more