LATEST ARTICLES

One of the hardest forms of cyber attacks to fend off is spear phishing campaign because it resorts to various vectors and often takes advantage of what is known about a victim's work or private life in order to...
If in recent years the prospect of facial recognition technology as a privacy intrusion tool remained for long a hypothesis, this time around with corporate push by major tech firms including Facebook and Google, the horrible truth is almost...
If you are an LG smartphone user, chances are you're one of the potential victims of man-in-the-middle attacks. That is based on the findings by security researchers of Search-Lab in Hungary. The vulnerability is said to enable attackers to supplant...
In an effort to keep malicious actors and phishing campaigns in Facebook at bay, Russia-based Kaspersky is joining forces with the social networking giant. The ultimate goal is to scan Facebook free of all forms of malicious activities that...
While the most common cause of data breaches affecting the public and private sector is often the shortcomings on the part of an end user, developers also have a share of liability for what brings about this cyber incident. According...
When it comes to marketing your product through mobile platforms, it is best to consider a number of factors before diving into the game. Internet users who spend most of their online activities via mobile devices continue to grow in...
The security community has uncovered a troubling discovery with regards to the state of Apple passwords and private account details, in which vulnerabilities were found. According to what the researchers found, hackers could gain access to the Apple Keychain due...
There is a growing stigma concerning the U.S. government's lack of robust data infrastructure to ward off cyber attacks, especially as the news of a hacking on the Office of Personnel Management is still fresh. The OPM hack serves as...