.

vulnerability

Cyber Threat to Children’s Toys and Baby Monitors sold in Britain

At last the United Kingdom’s Cyber Watchdog “The National Cyber Security Center (NCSC)” seems to have reacted to a major cyber threat concern posed...

Data Breach stories for this day

1.) Three million Google Chrome UK users are vulnerable to hackers-A research conducted by a cybersecurity consultancy firm named ‘Surecloud’ has discovered that all...

WhatsApp users should be aware of this Cyber Security Vulnerability

All those who are using WhatsApp, you better be aware of this new cybersecurity threat related to WhatsApp. It’s said that a bug in...

Samsung Galaxy S7 mobile phones are vulnerable to Cyber Attacks

Researchers from Austria based Graz Technical University have come to a conclusion that hackers can anytime exploit the meltdown vulnerability on Samsung Galaxy S7...

Android apps hosted on Google Cloud are vulnerable to hackers

All those Android apps hosted on Firebase Databases are said to be vulnerable to hackers. Remember, Firebase is a cloud-based backend platform for mobile...

LTE data transmission is vulnerable to hackers

Researchers have found few mobile security loopholes in the data transmission of LTE networks aka 4G networks. Experts say that the vulnerability identified recently...

Shallow Defense In Depth

Are More Security Controls Really Making You More Secure?The average enterprise uses 75 security products just to secure their network. Organizations mistakenly believe that...

Windows 10’s Controlled Folder Access Won’t Protect Your Data

What is Controlled Folder Access? With the release of Windows 10 Fall Creators Update, Microsoft added a new feature called Controlled Folder Access (CFA) to...

Case study: CloudPassage enables security for the Centrify DevOps team with...

This post was originally published here by casey pechan.We love our customers, especially when they make for the perfect case study! This was particularly...

Google issues a Mobile Security patch to Android Application Package Vulnerability!

Android attackers started to exploit a vulnerability of the said OS that enables hackers to bundle malware with Android Application Files and evade antivirus...
Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!