- The Role Of AI In Cybersecurity – Boon Or Bane?
- Less Than Half Of Cybersecurity Professionals Have A Plan In Place To Deal With IoT Attacks: Study
- Cyberattacks Go Up For Small Businesses Over The Past Year: Study
- Phishing And Credential Stuffing Attacks Remain Top Threat To Financial Services Organizations And Customers: Study
- IT-Based Attacks Increasingly Impacting OT Systems: Study
Microsoft's latest 'Redstone 4' test build, 17063, includes includes its promised Timeline feature, the start of Edge support for Progr...
The company says over 745 percent of projects hosted on the platform use dependencies, and that opens them up to inherent vulnerabiliti...
The company today announced that LinkedIn integration within Outlook.com is now going live, allowing email users to view insights, prof...
Discovered by Alex Birsan, the researcher describes the latter flaw as the "Holy Grail of Google bugs" as it would have allowed an atta...
After last week we had the KRACK and ROCA cryptographic attacks, this week has gotten off to a similarly "great" start with the publica...
By Nisheeth Bhakuni in misc | October 26th, 2017
More than 60% of app developers recommend a “freemium” model for monetizing a mobile app, according to a new survey. ...
A new ransomware called Anubi was discovered by Malwarebytes security researcher S!Ri that appends the .[anubi@cock.li].anubi extension...
By Nisheeth Bhakuni in misc | October 16th, 2017
Mathy Vanhoef, a researcher from the University of Leuven (KU Leuven), has discovered a severe flaw in the Wi-Fi Protected Access II (W...
Google is ending its controversial First Click Free (FCF) policy that publishers loathed because it required them to allow Google searc...
By Nisheeth Bhakuni in misc | October 3rd, 2017

Google has announced ARCore, bringing augmented reality (AR) functionality to Android smartphones....
By Nisheeth Bhakuni in misc | September 3rd, 2017