Security

Gemalto published the Breach Level Index Report. More than 1 billion data records were stolen

Gemalto has issued the 2014 Breach Level Index based on data gathered from publicly-available information about data breaches throughout the…

11 years ago

New Studies Proving Non Immediate Reaction of Antivirus Tools to Threats

It has been outlined that most antivirus software do not detect all the malware and other threats that they should,…

11 years ago

Obama signed a new Executive Order on sharing cyber threat information

The US President Obama has recently announced a new Executive Order Promoting Private Sector Cybersecurity Information Sharing. Cyber security is…

11 years ago

EU parliament bans the Microsoft mobile Outlook app

The experts at the IT Department of the EU parliament bans the Microsoft mobile Outlook app due to the recently…

11 years ago

Discovered 40000 vulnerable MongoDB databases on the Internet

Three German students have discovered that tens of thousands of MongoDB databases running as a service or website backend were…

11 years ago

More than 16 million mobile devices are infected worldwide

A recent study published by Alcatel-Lucent's Motive Security Labs reported that 16 million mobile devices worldwide have been infected by…

11 years ago

US Government Launching New Cyber Threat Intelligence Integration Center

US government is launching the Cyber Threat Intelligence Integration Center for the co-ordination of all other departments and improving of…

11 years ago

Memex – The new search tool to dig also in the Deep Web

DARPA has publicly presented for the first time a new set of search tools called Memex which will improve also…

11 years ago

WhatsSpy Public tool can spy on Whatsapp users

WhatsSpy Public is a web-based tool that could allow an attacker to access Whatsapp user information related to his activity.…

11 years ago

The GHOST vulnerability is a threat to critical business applications

Researchers at Veracode discovered that nearly 41% of enterprise applications using GNU C Library employ the Ghost-ridden 'gethostbyname' function. GNU…

11 years ago

This website uses cookies.