Data leak costs £183 million
Credit to Author: Leonid Grustniy| Date: Tue, 09 Jul 2019 18:50:40 +0000
British Airways may pay a record fine for last year’s data breach.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Leonid Grustniy| Date: Tue, 09 Jul 2019 18:50:40 +0000
British Airways may pay a record fine for last year’s data breach.
Read MoreCredit to Author: Marvin the Robot| Date: Fri, 28 Jun 2019 15:59:13 +0000
Lake City, Florida, joins the list of ransomware victims — and decides to pay.
Read MoreCredit to Author: Alexander Moiseev| Date: Fri, 14 Jun 2019 16:45:39 +0000
Digital signatures cannot solve the requirement of checking the authenticity of documents required by KYC procedures. That is where smart contracts may come in handy.
Read MoreCredit to Author: Leonid Grustniy| Date: Thu, 30 May 2019 16:42:19 +0000
For three weeks, Baltimore’s administration has been struggling with the aftermath of a ransomware attack.
Read MoreCredit to Author: Ganesh Lakariya| Date: Mon, 27 May 2019 07:02:35 +0000
Red Hat engineers and experts discovered a memory corruption vulnerability in Linux kernel, which is basically a flaw while implementation of RDS (Remote desktop Protocol) over TCP. This flaw has affected Red Hat, Ubuntu, Debian and SUSE and security advisories have been issued for all. This flaw could enable an…
Read MoreCredit to Author: Artem Karasev| Date: Fri, 17 May 2019 13:46:08 +0000
To protect themselves, businesses need to take a proactive approach, constantly adapting their security controls to the ever-changing threat environment.
Read MoreCredit to Author: Nikolay Pankov| Date: Fri, 03 May 2019 12:12:16 +0000
“Solo: A Star Wars Story” from a cybersecurity point of view
Read MoreCredit to Author: Anant Pulgam| Date: Fri, 26 Apr 2019 07:02:51 +0000
From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. One of the ways to earn cryptocurrencies is to mine them. Nowadays cryptocurrency miner malware have become hot attack vectors for cybercriminals due to its ease of deployment and instant…
Read More