Editor's Pick

Office Depot

Allegedly Creative Vulnerability Diagnosis By Charles Parker, II; InfoSec Architect Retailers do not have the most pleasant...

Shedding the Light on Deep Network Visibility for Cyber Intelligence Applications

DWDM is the backbone technology for optical networks but presents a challenge to government agencies...

CyberSecurity: Machine Learning + Artificial Intelligence = Actionable Intelligence

By Smit Kadakia, Co-founder, Seceon Overview The goal of artificial intelligence is to enable the development of...

Australia is confident that China was behind attack on parliament, political...

Australia 's intelligence is sure that China is behind the cyberattacks that hit its parliament and political parties, but decided to not publicly accuse...

Austrian Hotel’s Ransomware Run-In Highlights IoT Vulnerabilities

By Alexandre Cagnoni We’re seeing it everywhere… from lightbulbs and refrigerators to cars and homes… the ongoing adoption of IoT (Internet of Things) in everyday...

This Data is mine, mine, mine, mine.

By Jonathan Stock, Cyber Security Recruitment Consultant, IntaPeople. It seems every time I write an article I could mention Trumps’ approach to cybersecurity; watching him...

Cybersecurity and Compliance 1-2-3? Start with G-R-C

By John South, Senior Director of Global Threat Intelligence Development at NTT, Ltd. When an individual responsible for security, compliance and risk management in a...

Cyber Security the Major Issue of 2019

By Angelica Technology has provided services to the whole humanity like no time ever before. Now in this contemporary world, everything is connected such as...

Astaroth Trojan leverages Facebook and YouTube to avoid detection

Cofense experts uncovered a new variant of the Astaroth Trojan that uses Facebook and YouTube in the infection process. Researchers at Cofense have uncovered...

The Dawn of the DDoS of Things (DoT)

Dr. Chase Cunningham, Director of Cyber Operations at A10 Networks Last year saw an unprecedented uptick in the volume, size, and scope of distributed denial...

Anti-Abortion Ads Plague Women-Online Privacy Lies in Peril

By Anas Baig If the recent anti-privacy bill's existence was not enough, it has sparked numerous debates resulting in internet users resorting to different tactics...

STAY CONNECTED

36,188FansLike
56,025FollowersFollow
Show Buttons
Hide Buttons