Tech & Science
The DomainTools report looks at the current state of cybersecurity and reflects on how well (or poorly) the industry has performed during 2019, and...
Hi, what are you looking for?
The DomainTools report looks at the current state of cybersecurity and reflects on how well (or poorly) the industry has performed during 2019, and...
With cybersecurity, the next year will bring a new range of threats that will take technology security beyond its traditional boundaries. The new threats...
According to the BBC, a video showing a hacker talking to a young girl in her bedroom, accessed via her family’s Ring camera, has...
Between quickly evolving U.S. Health Insurance Portability and Accountability Act (HIPAA), California Consumer Privacy Act (CCPA) and General Data Protection Regulation (GDPR) regulations, it’s...
A hackers group linked to Moscow has targeted sporting and anti-doping organisations across the world with “significant” cyberattacks as anti-doping authorities mull new allegations...
From mergers to new privacy regulations; and from cloud computing and new hacker tactics, businesses are facing an array of different threats to their...
Based on the new report, Apple iPhone users have been warned to check their devices in relation to 17 malicious apps. The apps contain...
The researchers at Google’s Threat Analysis Group discovered a set of hacked websites which were being used in indiscriminate ‘watering hole’ attacks against their...
The new report (“Digital Browser Identities: The Hottest New Black Market Good”) outlines the key implications that both companies and consumers must consider for...
A digital identity is information on an entity used by computer systems to represent an external agent, such as a person, organization, application, or...