- The Role Of AI In Cybersecurity – Boon Or Bane?
- Less Than Half Of Cybersecurity Professionals Have A Plan In Place To Deal With IoT Attacks: Study
- Cyberattacks Go Up For Small Businesses Over The Past Year: Study
- Phishing And Credential Stuffing Attacks Remain Top Threat To Financial Services Organizations And Customers: Study
- IT-Based Attacks Increasingly Impacting OT Systems: Study
MalwareHunterTeam discovered a new variant of the CryptoMix ransomware that is appending the .x1881 extension to encrypted file names....
By Nisheeth Bhakuni in archive | October 16th, 2017
Infineon TPM chipsets that come with many modern-day motherboards generate insecure RSA encryption keys that put devices at risk of att...
By Nisheeth Bhakuni in archive | October 16th, 2017
New ‘safe and simple’ service to be introduced by January
...
By Nisheeth Bhakuni in archive | September 28th, 2017

Bugsee has announced new developer-friendly features including instant feedback, application health assessment, and new integrations wi...
By Nisheeth Bhakuni in archive | September 28th, 2017
EME is an API which allows plugin-free playback of encrypted content in Web browsers....
By Nisheeth Bhakuni in archive | September 22nd, 2017
Today, Google is releasing its internal developer documentation style guide. This can quite literally guide your documentation, giving...
By Nisheeth Bhakuni in archive | September 12th, 2017
ONE OF THE most shocking things about Thursday's announcement of the Equifax data breach is the sheer scale of the numbers involved....
By Nisheeth Bhakuni in archive | September 10th, 2017
Turning over the platform to an open source foundation could broaden the Java community, but don’t look for it to happen soon
...
By Nisheeth Bhakuni in archive | September 3rd, 2017
The voice-control platform wars are getting open sourced.
...
According to a source familiar with the company's plans, Google will launch not just two new Google Pixel phones at a hardware event th...
By Nisheeth Bhakuni in archive | August 22nd, 2017