1638 posts
Telecoms giant TalkTalk suffers critical data breach
When it comes to protecting the private information housed within your company’s network, it’s been proved time and again that no business can afford to…
How a drone can hack into your home’s network just by flying over it
Drones can be used to record incredible scenes for movies, to follow thieves from above, to save lives, or to carry out home deliveries at…
Kemoge: Google Play faces new app attack
Android users will be well aware of the fact that the Google Play store, and their Android device, are constantly under the watchful eye of…
Inside the mind of a cybercriminal: what is he looking for and why has he chosen your business?
One of the first steps to ensure that your private information isn’t accessible is to understand the reasons that drive hackers and cybercriminals to do…
The advantages of having a managed security service
In the corporate environment, cyber-threats are becoming more and more sophisticated, security standards more complex, and budgets tighter and tighter. The world of technology in…
All it takes is a laser pen to confuse the so-called “smart car”
Besides radars, cameras, or a GPS system, Google decided that its driverless car would also have a powerful eye mounted on top of the vehicle…
The main information security certifications for businesses
Just being aware of all the headlines is enough to realize that new threats and vulnerabilities in the field of information security are constantly emerging.…