Mobile security is the topmost concern among the organizations today, thanks to mobility and BYOD (Bring Your Own Device). Most employees now routinely access corporate data from smartphones and tactfully keep sensitive information away from wro... Read more
The second Ransomware report of 2018 highlights the entire details of the kind of attacks happened at the beginning of the year. It not only gives the details of ransomware threat figures but also informs us of phishing attacks, malware URLs, an... Read more
Infected Devices were given by Taiwanese police to the cyber-security quiz winners Police have apologized after giving infected memory sticks as prizes in a government-run cyber-security quiz. Taiwan’s national police agency said 54 of the... Read more
Image spam is a technique where a spam is delivered in the form of an image. This is mainly done to evade spam filters that scan specific keywords. It works better because any user can read his/ her image, whereas anti-spam mechanisms cannot. An... Read more
Patch Tuesday is here and Microsoft has released Security updates for the list of software mentioned below and addresses multiple vulnerabilities as mentioned below. List of Affected Software: Internet Explorer Microsoft Edge Microsoft Windows M... Read more