The Latest in IT Security

minus
  • img
  • img
  • img
  • img
  • img
  • img
  • img
  • img
plus

Categories

FRIDAY, MARCH 24, 2017

Featured

Archives

Latest Comments

Social Networks

The idea that smartphone cameras may represent cybersecurity risks is not new. Smartphone-induced risks have plagued researchers from the beginning of this trendy devices’ rise. In time, specialists analyzed various scenarios. More recently, an official incident determined a new wave of smartphone camera-related concerns. More precisely, as CNN Tech described in their article, the question […]

Read more ...

A distributed denial-of-service (DDoS) attack is one of the most popular tools in the cybercriminal arsenal. The motives behind such attacks can vary – from cyber-hooliganism to extortion. There have been cases where criminal groups have threatened their victims with a DDoS attack unless the latter paid 15 bitcoins (more than $5,000). Often, a DDoS […]

Read more ...

Desktop virtualization, also known as virtual desktop infrastructure (VDI), as a technology born out of the hypervisor revolution of the past 10–15 years, has moved from cutting edge to mainstream, and today is regarded as a highly mature solution for delivering secure, reliable, centrally managed desktops with many advantages over traditional PCs and laptops. The […]

Read more ...

The chances of you encountering malware on your Android phone is incredibly small, according to Google. By the end of last year, less than 0.71 percent of Android devices had installed a “potentially harmful application”, such as spyware, a Trojan, or other malicious software. Read More

Read more ...

Hackers claiming to have hundreds of millions of iCloud credentials have threatened to wipe date from iPhones, iPads and Macs if Apple does not fork over $150,000 within two weeks. “This group is known for getting accounts and credentials, they have gotten credentials in the past,” said Lamar Bailey, director of security research and development […]

Read more ...