Generative Data Intelligence

Tag: cyber

Thoughts on RSA 2017

Reading Time: 3 minutesRead the blog article to find out what were the hot topics discussed during RSA Conference 2017.  Information technology and cybersecurity...

What I Learned This Week – 1/13/17

It’s the second week of January and everything seems to be back on the routine. A new era is United States...

Warning! Your Headphones may be Functioning as a Microphone!

Reading Time: 2 minutesA new kind of malware can turn speakers to microphones. Dubbed “SPEAKE(a)R” it can also make computers eavesdrop on the...

Cobalt Malware Threatens ATM Security

Reading Time: 3 minutesA cyber criminal collective known as the Cobalt Group is suspected to be behind the ATM malware “touchless jackpotting” attacks...

Ransomware Served Through Online Ads

Reading Time: 3 minutesCyber criminals have resorted to another sophisticated way of infecting user systems with ransomware and other malware. Malvertising or compromised...

Massive Internet Outage Powered by IoT Devices

Reading Time: 2 minutesUsing hacked “Internet of Things” (IoT) devices, cyber criminals had launched a massive internet attack on the Internet infrastructure company...

Massive Cybersecurity Breach at Yahoo

Reading Time: 3 minutesOn Sep 22, 2016, Yahoo issued a press release: “A recent investigation by Yahoo! Inc. has confirmed that a copy...

Protect Yourself Against Identity Theft

Reading Time: 2 minutesYahoo has been hacked. LinkedIn has been hacked. Accounts have been stolen. Identities have been stolen. Identity theft is said to...

How Enterprise IT Would Gain From Artificial Intelligence

Reading Time: 2 minutesArtificial Intelligence (A.I) is touching lives in the most intimate of manners and seems to be playing a vital role...

When DDoS Attacks, Botnets Play Mischief

Reading Time: 2 minutesDDoS attacks (Distributed Denial of Service attacks) and the data breaches that accompany such attacks are of serious consequence; these...

Lack of Basic HTTPS Leads to Major Data Breach at Clash of Kings Forum

Reading Time: 2 minutesClash of Kings is a very popular mobile game with millions of avid players being members of its official forum....

File Converter Backdoor Mac Malware Infects Mac OS X

Reading Time: 2 minutesThe latest malware to hit Mac operating systems is the EasyDoc Converter. Cyber security experts have discovered this dangerous Mac...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?