Latest stories

  • in

    Why Social Engineering is Still a Big Problem in 2021

    Trending Hot

    Social engineering is one of the most commonly used methods of stealing information from individuals and businesses alike. This is a form of cyberattack that is usually difficult for a user to recognize because it mostly relies on human interaction rather than computer code. The most important thing to remember about this method of attack […] More

  • in

    Coalition Against Apple Tax 

    An industry coalition is organized by developers and studios that object to specific terms of Apple’s App Store.    The founders of the App Fairness coalition include Epic Games, Spotify, and Deezer, among others.    Companies object to some aspects of Apple’s app marketplace, the App Store, are objecting to some elements of its mandatory […] More

  • in

    Internal data theft reported at Shopify.

    online shopping

    One of the largest e-commerce platforms, Canadian Shopify, reported a data breach involving 200 webshops and its customers. An unspecified number of customers’ data may have been compromised after two internal employees from Shopify, one of the largest e-commerce platforms, tried to steal the user databases and transaction records of about 200 webshops. According to […] More

  • in ,

    Google is building a much-needed accelerator into Chrome, and you can try it out right now.

    Hot Popular

    Despite its popularity, Google Chrome has a severe flaw: it still uses a lot of memory, and opening up a dozen pages on your machine can be painfully slow. A new function wants to change this. However we look at it, Google Chrome is the world’s most popular browser, and it has a pretty big […] More

  • in

    Top 3 Cyber Threats Of 2018

    Trending

    man-in-hood-jacket-hacking-a-laptop

    2018 saw the emergence of new malware, ransomware and other innovative ways of exploiting vulnerabilities in cyber systems. Here a few of the cyber threats that defined the year. VPNFilter VPNFilter is a malware program which is believed to have been developed by Fancy Bear APT Group. The malware has been hiding in a number […] More

  • in

    Cyber Security Firm Report That Monero-Mining Malware is Evolving

    Monero mining big yellow mining truck

    KingMiner is a malware program that hijacks a host computer and diverts the computer’s processing power towards mining a cryptocurrency called Monero. This malware infects Windows Servers and uses several ingenious methods to avoid detection. KingMiner was first detected back in June, and new ways were developed to detect its presence, but reports from Check […] More

  • in

    Insiders Pose The Greatest Risk To Company’s Cyber Security

    password security log in technology

    Employees are a company’s weakest link when it comes to cybersecurity. A certain amount of employee negligence, which is when an employee is unaware of how his/her careless actions leave a company vulnerable to attack, is unavoidable but those risks can be mitigated. Some reports claim that malicious insiders account for 27% of all cybercrime. […] More