Newsfeed Archive
News & Highlights
(Source: Boston Business Journal) Ensure your organization has the appropriate security controls in place to help protect your valuable corporate and customer data, and mitigate the chance of becoming the next
Read More
News & Highlights
(Source: The Commentator) Without the necessary and proper security carried out by the cybersecurity industry, cybercrime damage costs are expected to reach $6 trillion annually by 2021, about $3 trillion more
Read More
News & Highlights
(Source: Technology 24) Global Big Data Security Market 2018 – IBM (US), Microsoft (US), Oracle (US), Amazon Web Services (US), HPE (US), Gemalto (Netherlands) … Symantec (US) , Pivotal (US) ,
Read More
News & Highlights
(Source: The Australian Financial Review) “Defence does not provide or support the use of unauthorised software, including the WeChat social media application, on Defence mobile devices,” a spokesman told The
Read More
News & Highlights
(Source: SecurityBrief Australia) Aleron Security Consultant Kerry Tang says, “Companies often think they’re too small or insignificant to be a target for cybercriminals but every business is a … They’re released
Read More
News & Highlights
(Source: PC Authority) Unpatched security vulnerabilities in the 4G LTE protocol allow anyone to connect to a network by impersonating a victim’s phone without possessing legitimate credentials, launch DDoS attacks, and hijack
Read More
News & Highlights
(Source: SC Magazine UK) Security researchers at IOActive recently carried out a Proof of Concept ransomware attack on a NAO robot to demonstrate how a malicious attacker could take … said
Read More
News & Highlights
(Source: Technology 24) Global Mobile Security Software Market report encompasses the overall and comprehensive study of the Mobile Security Software market with all its aspects influencing the growth of the market. This report
Read More
News & Highlights
(Source: Engadget) Slingshot also stores its malware files in an encrypted virtual file system, encrypts every text string in its modules, calls services directly (to avoid tripping securitysoftware checks) and even
Read More
News & Highlights
(Source: BW Businessworld) Neither the sender nor the receiver have to install any software. The solution does not occupy any smartphone storage space, nor does the user have to log
Read More