Imagine this: you are traveling for work and get into the cab for your business meeting, your phone beeps and says “new message” and you swipe your finger on the fingerprint scanner to read the notification. You realize that you are not able to... Read more
A zero-day attack is a flaw in software programming or hardware that is obscure to the user in charge of fixing or generally settling the blemish. The term zero-day may allude to the weakness itself, or an attack that has zero days between the t... Read more
A malvertisement (malicious advertisement) is an advertisement on the Internet that is equipped for tainting the PC with malware. Malvertising is the present PC capturing strategy for organized crime. Affected PCs can be utilized to make intense... Read more
Spear phishing is an email-spoofing attack that targets a specific organization or individual, looking for unapproved access to confidential data. Spear Phishing actions are not commonly started by irregular hackers, but rather will probably be... Read more
It’s time for our weekly IT security news wrap-up. Here are the stories that caught our eye this week: Google says it coded UIDAI helpline number into your phone The ‘whodunit’ of the mysterious UIDAI helpline number being saved on Android devic... Read more