Hackers spare nobody in their attacks, not even the most robust government information security infrastructure.
Blog
What is social engineering and how risky is it?
It is a fact in technology, and specifically in security, that the human factor forms part of the weakest link in the network. The problem, therefore, facing many organizations in terms of cybersecurity has something to do with their employees.
Windows 10’s data collection activity poses risk to privacy
Experts warn that the mandatory collection of user data such as location and keyboard input by Microsoft’s Windows 10 operating system for desktop is exposing users to a variety of privacy risks.
Western Digital external hard drives found to contain security flaws
Western Digital, a manufacturer of self-encrypting external hard drives, is facing a crisis in reputation. Academic researchers have uncovered a critical security flaw in the company’s self-encrypting external hard drives.
As SHA2 implementation nears, developing nations may face Internet access roadblocks
Millions of Internet users across the world are facing the dire possibility of losing permission to access majority of websites that run the HTTPS protocol, or are encrypted, with the impending implementation of the SHA2 encryption by 2016.
Android Trojan targeting online banking users spotted
Security researchers at Symantec have discovered an Android Trojan that is designed to target users of online banking services through various phishing pages the attackers deliver from cloud servers.