Monday, November 11, 2019
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST

Editor's Pick

Here’s How You Can Secure Your App from Cyber Attacks

By Twinkle Do you know how many people own a smartphone? Well, you'll be shocked to know...

Sovereign Cyber Effects Provided Voluntarily by Allies (SCEPVA)

The Devil is in the Kilobyte By Wiesław Goździewicz, Expert, Kościuszko Institute NATO has gone a long...

How Organizations Can Best Avoid GDPR Fines through Continuous Compliance

By Fouad Khalil, VP of Compliance at  SecurityScorecard Since it came into force in May 2018,...

Mysterious DarkUniverse APT remained undetected for 8 years

Kaspersky discovered a previously unknown APT group, tracked as DarkUniverse, by analyzing Shadow Brokers' "Lost in Translation" data dump. In 2017, a hacker group known...

‘Light commands’ attack: #hacking #Alexa, #Siri, and other #voiceassistants via Laser...

Researchers with the University of Michigan and the University of Electro-Communications (Tokyo) have devised a new technique, dubbed “light commands,” to remotely hack Alexa...

How to Suggest Your Manager to Invest into Cyber Defense?

By Milica D.  Djekic The first personal computers would appear in the early 80s of the 20th century. Since then the entire technological posture has...

How to Address the Top 5 Human Threats to Your Data

By Dave Sikora The first step in developing a resilient cybersecurity posture is identifying what it is you are trying to protect. For most businesses...

Are Financial Services the Golden Goose for Cybercriminals?

By Yair Green, CTO, GlobalDots The financial services industry has been a long-time favorite target for cybercriminals. They are always looking to steal information related...

The Social Engineering Methods and Countermeasures

By Milica D. Djekic During the time, the people would always try to get what some individuals being the part of some group would assume...

Two unpatched RCE flaws in rConfig software expose servers to hack

The popular rConfig network configuration management utility is affected by two critical remote code execution flaws that have yet to be patched. rConfig is a completely...

Intelligent Automation Week

Inspired. Engaged. Connect. Intelligent Automation Week focuses on YOUR journey across the realms of RPA and AI to allow you to overcome YOUR challenges with...

STAY CONNECTED

36,057FansLike
56,196FollowersFollow
Show Buttons
Hide Buttons