Home security App - Mobile Applications protect security

Applications protect security

Navigating the AI hype in security: 3 dos and 2 don’ts

I’ve been needling the artificial intelligence (AI) hype bubble since 2015 when, after managing a CalTech research grant, I saw a massive discrepancy between the attitudes of buzzword merchants and...

Facebook hoovered up 1.5 million users’ email contacts without permission… “unintentionally”

For such an allegedly smart company, Facebook doesn’t half do some dumb things. Kudos to the team at Business Insider who were as bewildered as the rest of us as to...

WordPress Websites Hit by a Barrage of Attacks

Attackers exploit the vulnerability of the Yuzo Related Posts plugin.Email automation service Mailgun has added a long list of companies that were victims of large-scale coordinated attacks on websites run...

Better protection against Man in the Middle phishing attacks

Posted by Jonathan Skelker, Product Manager, Account SecurityWe’re constantly working to improve our phishing protections to keep your information secure. Last year, we announced that we would require JavaScript to...

Web Security Academy – Free Training for Finding Web Vulnerabilities

Portswigger launched Web Security Academy, a free new learning source that covers techniques and methods for exploiting the bugs and how to avoid them. The training program contains learning materials, vulnerability...

Hackers Launching DNS Hijacking Attack to Gain Persistent access

Researchers discovered a new malicious campaign called “Sea Turtle,” attack public and private entities in various countries using DNS hijacking as a mechanism. State sponsored threat actors compromise at least 40...

AI and Blockchain in Cybersecurity Threat Detection

Artificial Intelligence and Blockchain have shown potential in providing various methods for threat detection, while both differ in nature, the combination of the two or even standalone capabilities can be...

WordPress Websites Hit by a Barrage of Attacks

Attackers exploit the vulnerability of the Yuzo Related Posts plugin.Email automation service Mailgun has added a long list of companies that were victims of large-scale coordinated attacks on websites run...

SIM Swap – An Attack Let Hackers Port a Telephone number to a New...

Cybercriminals are activity performing SIM swap Attack in various countries to bypass 2 Factor Authentication and to compromise the various social media apps including WhatsApp by porting a victims telephone...

LATEST NEWS

MUST READ