security

How To Keep Alexa Out Of Your Private Conversations

Yesterday, the news broke that Amazon has employed thousands of people to listen and transcribe your conversations via Alexa. According to Amazon, this information is used to better adapt Alexa’s search algorithm, but that doesn’t ease any privacy concerns. This isn’t the first issue that has been regarding Alexa and listening in on its users. […]

How To Keep Alexa Out Of Your Private Conversations Read More »

Google researchers reveal data-stealing, web-based iPhone exploit that was active for years

Researchers from Google have uncovered what appears to be a concentrated malware campaign targeting iPhones for at least two years. Thankfully, this may be over now, although they warn it’s possible there are others that are yet to be seen. Project Zero, the search giant’s security team tasked with finding zero-day vulnerabilities in software, said they

Google researchers reveal data-stealing, web-based iPhone exploit that was active for years Read More »

Update now: Cisco releases patch to address critical vulnerability in IOS XE devices

Cisco Systems Inc. is urging customers to update affected routers quickly after the discovery and disclosure of a severe vulnerability on devices running its IOS XE operating system. CVE-2019-12643, as it’s known, ranked as a 10 out 10 for severity. The vulnerability in the Cisco REST API virtual service container for Cisco IOS XE, revealed Wednesday,

Update now: Cisco releases patch to address critical vulnerability in IOS XE devices Read More »

Trevor Noah’s advice to tech leaders: ‘They are now the man that they were trying to disrupt’

Trevor Noah is a comedian, writer, and political commentator arguably best known for hosting The Daily Show. Noah spoke today about technology, education, gaming, VR, and his foundation that helps children in the U.S. and South Africa. And of course, there were plenty of jokes. But it was Noah’s advice to tech leaders that arguably

Trevor Noah’s advice to tech leaders: ‘They are now the man that they were trying to disrupt’ Read More »

A New California Privacy Law Could Affect Every U.S. Business—Will You Be Ready?

In our data-fueled world, we’re seeing a record-breaking number of breaches. Take, for example, Facebook’s 2018 breach of 50 million accounts. In 2019, the social media company made the news again, when 540 million user records were exposed on Amazon cloud servers.  Unfortunately, data exploitation is not isolated to specific industries. For example, hackers gained

A New California Privacy Law Could Affect Every U.S. Business—Will You Be Ready? Read More »

Malicious websites were used to secretly hack into iPhones for years, says Google – TechCrunch

Security researchers at Google say they’ve found a number of malicious websites which, when visited, could quietly hack into a victim’s iPhone by exploiting a set of previously undisclosed software flaws. Google’s Project Zero said in a deep-dive blog post published late on Thursday that the websites were visited thousands of times per week by

Malicious websites were used to secretly hack into iPhones for years, says Google – TechCrunch Read More »

Hacks, cracks, and malware attacks – July 2019 

Each month, we’ll take a look at what’s happening on the front lines of the battle against various types of cyber-attacks, new variants of malicious software, phishing and other scams, vulnerability exploits, and other threats to the security of your networks, systems, and data.  There was a time, not so long ago, when the only

Hacks, cracks, and malware attacks – July 2019  Read More »

Why Information Security is Vital in the Mobile Workforce Device Security

If your employees don’t currently telecommute, chances are that they will in the next decade. Even with former Yahoo! CEO Marissa Mayer banning home-based work, it was estimated that 20 to 30 million people telecommute at least one day of the week (U.S. Census Bureau). For small business owners this could be good news. Smaller

Why Information Security is Vital in the Mobile Workforce Device Security Read More »

This Woman Hacked Bank’s Servers To Mine Cryptocurrency

A couple of months back, ex-Amazon employee Paige Thompson was accused of gaining unauthorized access to the cloud servers of the US-based bank Capital One and 30 other entities. Thompson, who is currently in custody, was indicted on Wednesday and charged with Wire Fraud, Computer Fraud and Abuse. She will be presented in front of

This Woman Hacked Bank’s Servers To Mine Cryptocurrency Read More »

Top Reasons Why You Should Choose Linux

Apr 14, 2019 Posted by Brian Njoroge in Listicles | 0 comments Linux popularity has grown over the years. It is one of the leading operating systems used on servers and mainframe computers. It is used by around 2.3 percent of desktop computers. The Chromebook runs the Linux kernel-based ChromeOS. Linux services empower some of

Top Reasons Why You Should Choose Linux Read More »

WP Twitter Auto Publish Powered By : XYZScripts.com
Exit mobile version