Currently, most computers are connected to the network, and various information is exchanged beyond national borders. Mobile devices such as smartphones and...
The Japanese Ministry of Internal Affairs and Communications revealed in a recent report that 2/3 of cyber attacks in 2016 were aimed...
The company behind Aztarna is Alias Robotics, a cyber-security startup. Manufacturers and users of IoT robots should breathe a sigh of relief that...
The Japanese government has passed a new law amendment that will allow officials to hack into citizen’s Internet of Things devices to...
Chinese company Xiaomi has a plethora of categories to offer to the users. However, there are many products unavailable in India and users...
Enterprise security vendor ForeScout’s operational technology research unit has developed a PoC (Proof-of-Concept) malware that exposed the vulnerabilities in building automation systems (BAS)...
Weak security practices have rendered IoT devices vulnerable to hacking and all sorts of cyber-attacks. According to the research from a Buckinghamshire-based...
A critical data security trends in 2019 highlights show that protecting access to increasing volumes of sensitive data will be a challenge....
Several malware variants showed significant growth this year According to cybersecurity specialists from the International Institute of Cyber Security, the amount of...
A couple of weeks ago, a hacker going by the online handle of TheHackerGiraffe hacked over 50,000 printers for the sake of promoting PewDiePie’s...
Nearly 50,000 printers across the globe were hacked by a hacker using the alias TheHackerGiraffe for the sake of promoting PewDiePie’s YouTube...
The Internet of Things (IoT), responsible for connecting unthinkable things, now offers the possibility of connecting vehicles to the internet. With this,...
The real world is a jungle; it is really is still the survival of the fittest even after hundreds of thousands of...
Smartwatches are generally considered safe to keep track of your kids when they are outside the home. However, there is a scary...
Researchers at security firm CheckPoint identified a vulnerability in the website and apps of the popular consumer drone manufacturer DJI. The vulnerability...
California Capitol Dome with Moon This law will establish a cybersecurity standard for IoT manufacturers Jerry Brown, Governor of California, signed last...
Security researchers at NetLab, a sub-division of the Chinese cybersecurity firm Qihoo 360, have discovered a new, wide-scale, and very active malware...
Science fiction movies often depict various situations related to cybercriminals’ activity. These can include predicaments where threat actors disrupt the transportation system...
Vulnerabilities and security flaws in vehicle security systems aren’t as surprising for us as it is that even the most renowned car...
Who doesn’t like elegant watches, especially those who can literally save your life like the Apple Watch, right? Last time when we talked...
Right after the smartphone and tablet revolution that disrupted the laptop market considerably, the next big thing is the proliferation of IoT...