Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Android stalkerware, a danger for victims and stalkers

ESET research shows that Android stalkerware apps are affected by vulnerabilities that further threaten victims. ESET research reveals that common Android stalkerware apps are affected with vulnerabilities that could expose…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on Android stalkerware, a danger for victims and stalkers

Boffins found a bug in Apple AirDrop that could leak users’ personal info

Experts found a bug in Apple’s wireless file-sharing protocol Apple AirDrop that could expose user’s contact information. Boffins from the Technical University of Darmstadt, Germany, have discovered a privacy issue…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on Boffins found a bug in Apple AirDrop that could leak users’ personal info

Gap of The Red Team from The Leak of Fireeye

Use “Imaginary Enemy” methodology to mitigate APT Attack By Jamal Uddin Shaikh, Cybersecurity Architect and Technology Lead , Appxone Introduction Early in the morning, I was pulled up by the…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on Gap of The Red Team from The Leak of Fireeye

Cyberattacks could pose a material risk to water and sewer utilities

Fitch Ratings is warning that cyberattacks could pose a risk to water and sewer utilities potentially impacting their ability to repay debt. Fitch Ratings Inc. is an American credit rating…

Posted in Uncategorized | Tagged , , , , , , , | Comments Off on Cyberattacks could pose a material risk to water and sewer utilities

Monetising Customer Data Without Their Knowledge Is Unethical and Must Stop By Sridhar Iyengar, MD, Zoho Europe

By Sridhar Iyengar, MD, Zoho Europe Large tech corporations have started turning into surveillance companies, tracking the behaviour of businesses and users who have become heavily reliant on their services…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , | Comments Off on Monetising Customer Data Without Their Knowledge Is Unethical and Must Stop By Sridhar Iyengar, MD, Zoho Europe

More Power, More Responsibility

What the Defense and Intelligence Communities Need to Know About 5G By Brian Green, Senior Vice President, Booz Allen Hamilton With the potential to revolutionize global telecommunications, fifth-generation mobile technology…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , | Comments Off on More Power, More Responsibility

Protecting Human Rights in The Era of Cyber Information Warfare

By Edwin Weijdema, Global Technologist, Product Strategy at Veeam Disinformation is undermining the limitless potential of technology to be a positive force for industries, businesses and communities. In the current…

Posted in Uncategorized | Tagged , , , , , , , , , , | Comments Off on Protecting Human Rights in The Era of Cyber Information Warfare

13th Anniversary Global InfoSec Awards for 2025 now open for early bird packages! Winners Announced during RSAC 2025...

X