Cyber Attacks: Page 8
Do You Use Google Takeout? The Company Might Have Leaked Your Data To Strangers
Google admitted that it accidentally shared personal videos of some of its Google Photo users with strangers
These Four Areas Will Dominate the Cybersecurity Agenda for APAC in 2020
Companies must accept that the battle to protect enterprise data is now a permanent feature of the business landscape. Organisations have to be on constant alert to evolving threats, and the actions outlined in this article should form the basic building blocks of corporate data protection.
Employees Are Your Weakest Link Against Cyberattacks. Don't Put Them on the Front Lines
It is the responsibility of businesses to create cybersecurity cultures that keep employees informed of risks and teach them strategies to stay one step ahead of hackers, but that consciously avoid placing employees at the center of prevention itself.
This is How Google Plans To Safeguard Users From Cyber Attacks
Google's browser Chrome will now warn the users if their username and password have been compromised in a data breach on some site or app
48 Government Sites Hacked In 2019: Here Is How The Centre Is Planning To Tackle Cyber Crimes
This is a significant drop from 99 hacks recorded in 2016, 172 in 2017, and 110 in 2018.
Is It Safe For You To Use WhatsApp?
CERT-In has alerted users about a new vulnerability where hackers can attack the messaging platform using MP4 files
WhatsApp Returns Disappointed After RBI Bars Launch Of Payments In India
RBI has told Supreme court that WhatsApp is not compliant with data localisation norms and has directed NPCI to stop full-scale launch of WhatsApp Pay in India
Will Launch Of WhatsApp Pay Get Delayed Due To Concerns Over Spyware Attack?
The Indian government will discuss risks of allowing social media companies to offer online payment services with RBI and NPCI
Everything You Need To Know About Israeli Spyware Attack Through WhatsApp
Indian government has asked WhatsApp to explain how the spyware Pegasus was used to spy on Indian users by November 4
Superheroes of Cybersecurity: How Tom Albert and His Team Are Changing the Way the World Sees Risk
Risks and no regrets fueled this entrepreneur's rise to the top in artificial intelligence technology.
Data Security in the Age of Online Payments and Social Media Validation: Where Does the Buck Stop?
In the light of the now infamous Tumblr adult content ban episode, the risk of compromise and misuse of digital media becomes all the more important
How Artificial Intelligence Is Changing Cyber Security Landscape and Preventing Cyber Attacks
Whether it is Network Security, behavioral analytics, vulnerability management or phishing detection, AI and machine learning tools are indispensable while dealing with cyber security.
How SMBs can diminish the risk of a data breach
Perceived notions of 'high-cost investment', ignorance and a mindset 'who would target us' makes the SMBs, a hacker's goldmine. This perspective needs a re-set
Top 3 Cyber Threats Prevalent Globally and How To Combat Them
Through monitoring, software professionals can verify security and compliance requirements regardless of whether data is stored locally, in a database, in a virtual environment or in the cloud
Survey: More Than 8 in 10 Fell Victim to Phishing Attacks in 2018. Here's What to Know About the Practice. (Infographic)
Phishing and other social engineering attacks cost victims more than $1.4 million in 2018, according to an Accenture study.