Thursday, September 20, 2018

The Top 3 Reasons to Integrate DLP with a Cloud Access Security Broker (CASB)

Companies of all sizes are adopting cloud-based services, such as Microsoft Office 365, as a way to give their end-users greater flexibility and easier access to core business applications.  This...

Dangerous Pegasus Spyware Has Spread to 45 Countries

The malicious spyware has also been found in use in countries known for targeting human rights. Source link

Tech Giants Charged with Tracking Children

New Mexico’s attorney general, Hector Balderas, announced a lawsuit, filed against Google, Twitter, Tiny Lab Productions, MoPub, AerServ, InModi PTE, AppLovin and IronSource, on allegations that nearly 100 gaming apps targeting...

Mirai Botnet Authors Avoid Jail Time — Krebs on Security

Citing “extraordinary cooperation” with the government, a court in Alaska on Tuesday sentenced three men to probation, community service and fines for their admitted roles in authoring and...

WhatsApp New Feature Launched Which Will Make Texting In The Dark

Facebook-possessed organization WhatsApp has had a bustling year with one update after another. The application is by all accounts always endeavoring to...

State Government Online Payment Service Exposes 14M Customers

Outdated security practices made it simple to access other people's receipts for everything from traffic tickets to paying bail. Source link

Hackers Constantly Carrying out Password Stealing Attacks

Cyber Criminals are constantly targeting financial networks that lead to stole customer login details and the percentage of Password Stealing Attacks are on the rise. Hackers constantly targeting login pages of...

Mirai authors avoid the jail by helping US authorities in other investigationsSecurity Affairs

Three men who admitted to being the authors of the Mirai botnet avoided the jail after helping the FBI in other cybercrime investigations. I’m...

Cyber Threat Alliance Releases Analysis of Illicit Cryptocurrency Mining

In response to the explosive increase in cryptomining campaigns in Q4 2017, the Cyber Threat Alliance has formed a cryptomining subcommittee to assess the threat. This committee comprises expert researchers...

Fake finance apps used by cybercrooks to phish online banks

Cybercrooks use bogus apps to phish six online banks and cryptocurrency exchange Another set of fake finance apps has found its way into the official Google Play store. This time,...

APLICATIONS

Live Forensics Analysis with Computer Volatile Memory

Forensics Analysis The field of computer Forensics Analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted  in electronic or magnetic...

The end of Silex

HOT NEWS