More

    News

    Attackers finding new ways to exploit and bypass Office 365 defenses

    Over the six-month period from March to August 2020, over 925,000 malicious emails managed to bypass Office 365 defenses and well-known secure email gateways...

    Microsoft Warns Android Users About A New Ransomware

    Microsoft has warned about a new strain of mobile ransomware that takes advantage of incoming call notifications and Android's Home button to lock the...

    Parrot Security OS 4.7 Beta Relased

    Parrot is a GNU/Linux distribution based on Debian and designed with Security, Development and Privacy in mind. ...

    Blackout in Johannesburg Caused by Ransomware

    A ransomware infection has been reported on the systems of one of South Africa’s leading power suppliers, specifically in the capital, Johannesburg. The incident was...

    Top 5 .onion Websites From The Rabbit Hole

    The deep web is the area of the internet that search engines do not index. The dark web, which exists inside of layered proxy...

    Criminals Have Kidnapped People To Extort Bitcoin

    Police in India have rescued three people, including two cryptocurrency traders, that were held to ransom for two weeks to the sum of 80...

    Indian Bank Exposed Millions of Records Online

    On May 26th, Jeremiah Fowler discovered a non-password protected database that contained what appeared to be millions of financial transactions. Upon further research he was...

    How AI Will Help Radar Detect Drones

    Small drones are becoming a big problem. Here’s how next-generation neural networking techniques could help. Long before the U.S. Navy fried an Iranian drone over the Strait of Hormuz,...

    Top 5 Technology Trends For 2019

    Digital transformation drives companies to refresh their business strategies on an ongoing basis and most of the transition will be technology enabled. Leaders in technology...

    Latest articles

    spot_img