Schools in Singapore are educating students about cybersecurity
Image courtesy; ASEAN Technology & Security Magazine
Singapore is a city-state in Southeast Asia. How do you keep a robber out of your house? By shutting the door, thieves are more...
TSMC denied to provide customer data on US chip data request
In response to a U.S. chip data request, the world's biggest contract chipmaker Taiwan Semiconductor Manufacturing Co Ltd (TSMC), stated on Monday that it has not supplied comprehensive information on clients....
Newbies in cryptocurrency market are getting exploited by frauds
Image Courtesy; iNews
Those who are unfamiliar with bitcoin may not fully comprehend how the virtual currency operates. Many people will use Google and other search engines to look for answers...
Investors of SolarWinds Corp is after it’s board of directors following a major hack
Image courtesy; The Guardian
Investors in SolarWinds Corp (SWI.N) have sued the software company's directors, alleging that they were aware of and failed to manage cybersecurity threats prior to a hack...
A bug has been found on a philips database used for storing sensitive information
Image courtesy; TechRepublic
The Philips Tasy EMR, a medical record solution and healthcare management system used by hundreds of institutions, is vulnerable to two serious SQL injection issues.
The flaws are identified as...
Chain of cyberattacks on tribal owned casinos affected huge chunk of data
Image courtesy; Tribal Business News
Ransomware gangs have struck many tribal-owned casinos, knocking down their systems and disabling associated networks, according to the FBI's Cyber Division in a private industry notification given...
Google explains why the fingerprint scanner on the Pixel 6 may be slow
The Google Pixel 6 and 6 Pro have a lot to be excited about, but its fingerprint scanners aren't one of them. Users have been complaining about the Pixel 6's slow,...
Fingerprint biometrics users roped by gummy browser, a malicious website
Image courtesy; Medium.com
The Gummy Browsers attack aims to collect a person's fingerprint by tricking them into visiting a malicious website.
This attack approach can be used to get around 2FA on authentication...
Everything you need to know about JioPhone Next’s inbuilt ‘Device Lock’ functionality
The Reliance JioPhone Next has a function that ensures consumers who pick the EMI option for the phone complete their payments on time. If payments are not paid on time, the...
Mobile phishing exposure in the energy business increased 161% in 2021
According to a Lookout analysis, mobile phishing exposure increased 161 percent in the energy business between the second half of 2020 and the first half of 2021.
According to the findings, the...