Machines tackling the attacks

The future Of cybersecurity is protecting by Machines

Any country's' digital infrastructure and the businesses it supports are its most vital technology resources, as the COVID-19 pandemic makes clear. Cybercriminal and advanced persistent threat (APT)...
Cyberattacks on vpn

Warning on cyberattack threats on VPN issued by CERT-In

Federal security agency CERT-In on Tuesday warned of intensified cyber-attacks, including "social engineering hits" being used by organizations on virtual private networks (VPN) these days to promote...
Microsoft

Other 113 bugs with three zero-day vulnerabilities fixed by Microsoft

Microsoft has published a bunch of security updates that will be rolling out to several products over the coming days and weeks. As mentioned by ZDNet, the...
OnePlus

New features of OxygenOS announced by OnePlus

OnePlus company is implementing some innovations in their new smartphones and operating systems. Thanks to these innovations, a better experience is offered to the users. OxygenOS is...
Chinese Government

For 10 years, chinese government hackers stole world’s sensitive data

BlackBerry Ltd. has come up with a sensational report that indicates that Chinese state-sponsored hackers have been stealing data from computers across the globe for almost around...
Work From Home

Work From Home (WFH) makes everyone vulnerable to cyber attacks in corona lockdown

Every employees may stay protected against the highly infectious Novel Coronavirus COVID-19 and also from other perils like road accidents, snatching, and so on by staying indoors....
Apple Google

Phone will use as a COVID-19 Contact Tracking Devices by Apple and Google

Top MNCs Apple and Google have joined to develop an interoperable contract-tracing tool that will help individuals determine if they have come in contact with someone infected with COVID-19.As part...

A New IoT Botnet Malware Spotted in the Wild Emerging

Cybersecurity researchers have discovered a new emerging IoT botnet threat that leverages compromised smart devices to stage 'distributed denial-of-service' attacks, potentially triggered on-demand through platforms offering DDoS-for-hire...
zoom hack

Can Automated Dialer Easily Find and Hack Your Zoom Meeting How?

Despite all its recent apologies and hyperbolic justifications of how and why things may have gone wrong, the sheer volume of security inadequacies makes Zoom, a strict company to trust. Now,...
xhelper

After Factory Reset A xHelper Android Malware Re-Installs

A mysterious piece of Android malware that re-installs itself on infected devices even after users delete it or factory reset their devices—making it nearly impossible to remove.xHelper reportedly...
Hide picture