The first Ransomware report of 2018 highlights the entire details of the kind of attacks happened at the beginning of 2018. It not only gives the details of ransomware threat figures but also informs us of phishing attacks, malware URLs, and oth... Read more
The recent demonetization drive was a proof that digitization of currency / cashless society is still a distant dream. People switched over to the digital mode of transactions as it was the only option available considering the fact that cash fl... Read more
15-Year-Old macOS security flaw leads to full system compromise One security researcher started a Twitter storm on the New Year’s Eve stating “One tiny, ugly bug. Fifteen years. Full system compromise”. Apple had multiple security disasters in 2... Read more
Mobility is spreading fast among the enterprise and there is no turning back. BYOD (Bring Your Own Device) has received plenty of attention as a result and IT departments are on the toes to curb security risks of mobile devices in the workplace.... Read more
Almost every processor designed since 1995 is affected by “Speculative Execution Side-Channel Attacks” as per the extensive research was done by the researchers of Google Project Zero – Meltdown & Spectre. The vulnerabiliti... Read more