Tag "Hacker"

Back to homepage
Mobile

The way Bluetooth devices ‘talk’ to apps leaves them vulnerable

Mobile apps that work with Bluetooth devices have an inherent design flaw that makes them vulnerable to hacking, a research has found. Click here to view original webpage at www.helpnetsecurity.com

Software

7 Signs It’s Time To Get Focused On Zero Trust

When an experienced hacker can gain access to a company’s accounting and financial systems in 7 minutes or less after obtaining privileged access credentials, according to Ponemon, it’s time to

Identity Theft

How we can make Americans safer online

Since the first National Cybersecurity Awareness Month 15 years ago, the world has gone from about 800 million internet users to approximately 4.5 billion users. Over that same period of time, a lot of

Industry Insights

Amazon Web Services Says Users’ Cyber Protection is Their Own Responsibility

Amazon Web Services, which has been criticized for not helping clients protect themselves, says there’s only so much it can do for client cyber protection.Reuters reports Amazon Web Services (AWS) has

Mobile

Big Banks Vulnerable to Web, Mobile Attacks

Nearly all of the largest 100 banks are vulnerable to web and mobile attacks, which give hackers access to sensitive data, according to ImmuniWeb. “We leveraged an enhanced methodology from our previous

Software

Cyber Security Roundup for June 2019

June 2019 was another very busy month for security update releases. Microsoft released updates to patch 22 critical rated vulnerabilities, Intel released 11 fixes, and there were also several critical

Industry Insights

11 Eye Opening Cyber Security Statistics for 2019

Invented in 1989, the World Wide Web is home to around 2 billion websites today. This unimaginable expansion has brought the world closer and shrunk it into a small global

Industry Insights

How penetration testing can help secure your company’s infrastructure

Any type of security breach can have an impact and far-reaching repercussions for a company and its customers.Infrastructure security is a top priority for all IT managers.  Organisations must be

Mobile

Mobile cyber threats on the rise, but awareness still low: Experts

Smartphones are gaining currency in the Indian market, but their owners still show apathy towards protecting themselves from cyber threats, say cyber-security experts. Lack of awareness of device vulnerability is

Hardware/Network

What hackers inside your company are after: Convenience

Digital transformation is not a technology trend. Rather, it is a convenience trend. Businesses are changing because customer expectations demand it. Each day, consumers find yet another use for mobile connectivity.