From quite some time we have been hearing about hackers who have leaked explicit photos of various Hollywood celebrities which were uploaded on the Internet. There has been an assumption that some photos were stolen directly from celebrities’ ac... Read more
In this multi-channel, multi-device world, getting access to user’s data has become really simple. Companies collect data from different sources and use it for various purposes. The fact is many of us know that our data is being collected throug... Read more
These days Facebook is flooded with all sorts of videos, whether it is the latest wave of ice bucket challenge, celebrity videos or dancing pet cats. However, not all of us would like to watch all the videos that are posted in the news feed. Ear... Read more
The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by their research department for the Week of August 25, 2014. The National Institute of Standards and Technology (NIST) have recorded vulnerabi... Read more
With the advancements in technology, phishing attacks have only increased, proving it extremely beneficial for cyber-criminals. According to the RSA report, U.S. remained the most targeted country in July with 63% of phishing volume. On the same... Read more