Attacks

Cyber Attacks on fitness trackers, smartphones, and voice-activated gadgets

All those who are using Fitness trackers, smartphones and voice-activated gadgets such as Amazon Echo, here’s some bad news for you. The National Cyber Security Center (NCSC) and the National Crime Agency (NCA) of UK have generated a report which states that hackers are targeting people using the above said sophisticated gadgets to hold people […]

Insurance companies are now covering Ransomware Cyber Attacks

Insurance companies are now coming forward to cover ransomware related cyber attacks. And the credit goes fully to broad thinking of the insurance providers who now offering services as per demand. We all know that from past couple of years, ransomware attacks have increased on public and private companies- all thanks to the era of […]

Most Dangerous Cyber Security Threats of 2017!

In the world of Cyber Security, hackers are always busy circumventing various cyber defenses and Security companies are always found racing to react to these emerging cyber threats. Intel Security, in its latest report, has listed out the following as the new cyber security threats of 2017 and the list starts with- Ransomware- Holding organizations […]

Report confirms that US Computers are not safe from Cyber Attacks

Government Accountability Office (GAO) has released its latest report which says that computers operating in almost all government officer of United States are vulnerable to cyberattacks from state-sponsored actors. If this issue goes unchecked, then it can spell a doom on the security and integrity of America in near future. GAO has claimed in its […]

Three Proven Techniques for Detecting Targeted Attacks

Carl Manion wrote an interesting post about Three Proven Techniques for Detecting Targeted Attacks that I would like to share. “Thanks to extensive media coverage of the numerous cyber security breaches over the past several years, most organizations are generally aware of the risk they face due to advanced persistent threats (APTs) and highly skilled cyber […]

Share this page