Cybersecurity

Germany Won’t Exclude Huawei 5G Equipment

Germany has completed its ‘security catalog,’ a set of rules telecommunications companies must comply with as they deploy 5G networks. Reuters is reporting that, despite pressure from the U.S., German officials have not excluded Huawei from participation. The U.S. and Huawei have been at odds over allegations the equipment vendor has backdoors in its 5G […]

Germany Won’t Exclude Huawei 5G Equipment Read More »

Canadian SMBs incur a potential productivity loss of CA$2 billion using older technology 

A recent study commissioned by Microsoft and Intel reported that the cost of using a PC older than four years is more than buying a new one.  As per StatsCanada, the country is home to around 1.2 million small and medium businesses. These businesses comprise 98.8 per cent of the total employee businesses in the

Canadian SMBs incur a potential productivity loss of CA$2 billion using older technology  Read More »

SecTor 2019: The past, present, and future of malware

The evolution of malware has come a long way. From the Creeper Worm, the first known computer virus, which was designed in 1971 by Robert H. Thomas, to where we are today is night and day. It is a constantly evolving science. Bad actors adapt to the newest security practises; finding new ways to exploit

SecTor 2019: The past, present, and future of malware Read More »

Apples patches exploited vulnerability in iCloud and iTunes Windows PCs

A zero-day vulnerability in iCloud and iTunes on Windows PCs allowed hackers to install ransomware undetected. The vulnerability had been exploited by the hackers to run BitPaymer, which is a ransomware software. These kinds of softwares can encrypt a hard drive with a passcode that only the attacker knows, allowing them to then demand a

Apples patches exploited vulnerability in iCloud and iTunes Windows PCs Read More »

Digital India and Cybersecurity – A Promising Career Opportunity

With the launch of Digital India movement, India is moving at a fast pace towards developing a country-wide digital ecosystem. As the number of interconnected devices increases and Internet becomes accessible even to the population living in the remotest part of the country, the day is not far when India will be a digitally-connected space,

Digital India and Cybersecurity – A Promising Career Opportunity Read More »

SecTor 2019: How to survive a ransomware attack

Ransomware is not the newest form of cyberattack, although its popularity remains relatively high and the results remain quite devastating, according to cybersecurity experts who spoke at SecTor 2019 this week in Toronto. So, by now, you likely know what ransomware is all about. But just to be sure, let’s run over a quick explanation.

SecTor 2019: How to survive a ransomware attack Read More »

Flaw in D-Link routers opens the door to hackers but company won’t do anything

Routers from Taiwanese firm D-Link Corp. have a serious vulnerability that can allow hackers to steal data, but in unexpected twist, the company is doing nothing to address it. The vulnerability was detailed by security researchers at Fortinet Inc. Oct. 3, after D-Link was informed of the issue in September. The vulnerability, known as CVE-2019-16920, starts with a

Flaw in D-Link routers opens the door to hackers but company won’t do anything Read More »

New alliance including IBM, McAfee launches to bring interoperability to cybersecurity products

A new cybersecurity alliance of 14 leading companies launched today with a pledge to bring interoperability and data-sharing across cybersecurity products The Open Cybersecurity Alliance consortium, founded under the OASIS open standards and open source group, includes a raft of companies: IBM Corp., McAfee LLC, Advanced Cyber Security Corp., Corsa Techology Inc., CyberArk Software Ltd.,

New alliance including IBM, McAfee launches to bring interoperability to cybersecurity products Read More »

Google reveals hackers are using a new flaw to attack Android devices

A month after revealing a set of previously unknown “zero-day” vulnerabilities in iOS, Google LLC has exposed a zero-day flaw affecting its own Android operating system. The search giant published a technical description of the bug late Thursday. Project Zero, the Google security team behind the report, usually waits 90 days before publicizing a software vulnerability

Google reveals hackers are using a new flaw to attack Android devices Read More »

Alabama hospitals forced to close after ransomware attack

Three hospitals in Alabama were closed to all but critical patients Wednesday after a ransomware attack crippled their computer systems. The form of ransomware used in the attack on the hospitals, all run by a nonprofit firm called DCH Health System, is not currently known. “A criminal is limiting our ability to use our computer systems

Alabama hospitals forced to close after ransomware attack Read More »

?
WP Twitter Auto Publish Powered By : XYZScripts.com