A group of hackers dedicated to espionage attacks based in Russia has been targeting Linux computers using a simple Trojan malware that requires no root privileges, meaning the attackers have the option to install the malware using any account.
Blog
As Internet of Things interest grows, threats mount
Quite unarguably, there has been an escalating interest in the Internet of Things among businesses and homeowners, what with the comfort it provides to both individual and enterprise users. Accompanying this growing enthusiasm for IoT is a mounting concern over the security of the infrastructure as well.
How to protect your organization from fraudulent social engineering
The FBI recently revealed a case of business e-mail compromise that targeted an unnamed company in the United States through a deceptive email.
Biometrics or multi-factor verification: what’s the best security approach?
Having a tool to remotely access an enterprise network or even a personal computer has increasingly become a major driver for business efficiencies to manage operations and the human capital, especially at a time when everything we need to know is available right at our fingertips.
Google is collecting private data from students
As a data-rich company in constant need to grow its repository, Google is no doubt always in need for more sources of data to keep cash flowing into its trove. That is why it did not come as a surprise when Google admitted to collecting student data, though its denial of targeting ads to those […]
Olixar Qi-Tone Alarm Clock Qi Wireless Charging Bluetooth Speaker Review
If you are like me and putting full of stuffs on top of your nightstand or desk, you must be struggling to make it as clean as possible. The Olixar Qi-Tone Alarm Speaker might be a great idea as it combines many functionalities in one product. Let’s check it out.